gout109 发表于 2025-3-25 04:24:48
Towards Accountable Management of Privacy and Identity Information,t. They need to be secured and protected. Unfortunately people have little control over the destiny of this information once it has been disclosed to third parties. People rely on enterprises and organizations for its management. In most cases this is a matter of trust. This paper describes an appro乏味 发表于 2025-3-25 07:28:53
A Toolkit for Managing Enterprise Privacy Policies,rivacy policy often reflects different legal regulations, promises made to customers, as well as more restrictive internal practices of the enterprise. Further, it may allow customer preferences. Hence it may be authored, maintained, and audited in a distributed fashion..Our goal is to provide the t混合 发表于 2025-3-25 15:24:39
http://reply.papertrans.cn/24/2339/233848/233848_23.pngCapture 发表于 2025-3-25 18:44:25
http://reply.papertrans.cn/24/2339/233848/233848_24.pngcondescend 发表于 2025-3-25 22:25:33
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management,sandboxing application programs dynamically loaded on the chip. High-level (EAL5+) evaluation of the chip requires a formal security model..We formally model the memory management system as an Interacting State Machine and prove, using Isabelle/HOL, that the associated security requirements are met.Intellectual 发表于 2025-3-26 03:31:41
Bridging Model-Based and Language-Based Security, automatically verified. We use the Unified Modelling Language (UML) together with annotations to permit confidentiality to be considered during the whole development process from requirements to code. We have provided support for software development using UML diagrams so that the code produced canObituary 发表于 2025-3-26 05:22:30
An On-the-Fly Model-Checker for Security Protocol Analysis,ypes as a simple way of building an efficient on-the-fly model checker for protocols with infinite state spaces. The second is the integration of symbolic techniques for modeling a Dolev-Yao intruder, whose actions are generated in a demand-driven way. We present experiments that demonstrate that ougerrymander 发表于 2025-3-26 12:01:48
Symmetric Authentication within a Simulatable Cryptographic Library,ryptographic details. The typical abstraction is the Dolev-Yao model, which treats cryptographic operations as a specific term algebra. However, there is no cryptographic semantics, i.e., no theorem that says what a proof with the Dolev-Yao abstraction implies for the real protocol, even if provablychuckle 发表于 2025-3-26 14:29:34
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection,ects in the system, according to an existing security policy specification. These flows are generated by executed system operations. Illegal flows, i.e., not authorized by the security policy, are signaled and considered as intrusion symptoms. This model is able to detect a large class of attacks, rfetter 发表于 2025-3-26 18:56:59
Visualisation for Intrusion Detection,arm rates..Instead of building automated alarms that trigger when a computer security violation takes place, we propose to visualise the state of the computer system such that the operator himself can determine whether a violation has taken place. In effect replacing the ”burglar alarm” with a ”secu