Constrain 发表于 2025-3-28 15:14:26

Practical Solutions to Key Recovery Based on PKI in IP Securityvery has been the subject of a lot of discussion, of much controversy and of extensive research. Key recovery, however, might be needed at a corporate level, as a form of key management. The basic observation of the present paper is that cryptographic solutions that have been proposed so far complet

有帮助 发表于 2025-3-28 22:30:14

Redundant Data Acquisition in a Distributed Security Compoundredundant data acquisition to get the complete net-wide network traffic for later analysis. The compound itself has a distributed structure. Different components act together on different hosts in the security compound. Therefore, the acquisition and analysis are done net-wide by hosts with free res

售穴 发表于 2025-3-29 02:56:14

Survivability Strategy for a Security Critical Processof integrity, authenticity and confidentiality of data processing. It’s a matter of fact that high-level security may only be achieved through adequate physical protection. The classical approach is to close away such processes in computing centers protected by physical barriers with high drag facto

Motilin 发表于 2025-3-29 04:16:01

Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety Evaluatiems. Especially the probability that a systems operates (safely) using the probabilities that its components operate is a vital system characteristic and its computation is a nontrivial task. The most often used method to solve this problem is to derive disjoint events from the description of the sy

伟大 发表于 2025-3-29 08:17:43

http://reply.papertrans.cn/24/2338/233714/233714_45.png

猛击 发表于 2025-3-29 14:11:11

http://reply.papertrans.cn/24/2338/233714/233714_46.png

谷类 发表于 2025-3-29 17:37:31

http://reply.papertrans.cn/24/2338/233714/233714_47.png

种族被根除 发表于 2025-3-29 22:37:18

Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Componentsriginal design of such systems are either not available off-the-shelf (OTS) or have become extremely expensive as a result of being discontinued as mass production components. Maintaining a legacy system, therefore, demands using different OTS components. Trustworthy reliability assurance after an u

custody 发表于 2025-3-30 02:51:19

Assessment of the Benefit of Redundant Systems simulation has been proposed as a practical method to estimate diversity of multi-version software. This paper applies data-flow perturbation as an implementation of the fault injection technique to evaluate redundant systems under various conditions. A protection system is used as an example to il

标准 发表于 2025-3-30 04:25:11

http://reply.papertrans.cn/24/2338/233714/233714_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Computer Safety, Reliability and Security; 21st International C Stuart Anderson,Massimo Felici,Sandro Bologna Conference proceedings 2002 S