萤火虫 发表于 2025-3-25 03:42:03

The Possibility of Radical Reform?,agent systems. A unique aspect of the architecture is a “state appraisal” mechanism that protects users and hosts from attacks via state modifications and that provides users with flexible control over the authority of their agents.

粗鲁的人 发表于 2025-3-25 08:13:30

http://reply.papertrans.cn/24/2339/233878/233878_22.png

大炮 发表于 2025-3-25 14:32:40

http://reply.papertrans.cn/24/2339/233878/233878_23.png

Cumbersome 发表于 2025-3-25 16:04:08

Lightweight micro-cash for the internet,rotocols for cash withdrawal, payment and deposit. We reason that these features support a lightweight cash system suitable for handling very low value payment transactions, such as information purchases on the Internet.

Magnitude 发表于 2025-3-25 20:49:50

Digital payment systems with passive anonymity-revoking trustees,but only in case of a justified suspicion. In this paper we propose the first efficient anonymous digital payment systems satisfying this requirement. The described basic protocol for anonymity revocation can be used in on-line or off-line payment systems.

存心 发表于 2025-3-26 02:10:06

Role hierarchies and constraints for lattice-based access controls,property) and no-write-up (strict *-property), can be easily accommodated in RBAC. Our results attest to the flexibility of RBAC and its ability to accommodate different policies by suitable configuration of role hierarchies and constraints.

irradicable 发表于 2025-3-26 04:42:44

An authorization model for federated systems,sk of specifying authorizations. A site can require to authenticate the user at each access or accept his identity as communicated by the federation. An access control algorithm describing controls to be enforced at the federation and at each local site under the different authentication and administrative options is presented.

撕裂皮肉 发表于 2025-3-26 11:43:02

http://reply.papertrans.cn/24/2339/233878/233878_28.png

enflame 发表于 2025-3-26 15:45:44

Threat scenarios as a means to formally develop secure systems,specification. Security is defined as a particular relation on threat scenarios and systems. We show the usefulness of our approach by developing an authentic server component, thereby analysing two simple authentication protocols.

种类 发表于 2025-3-26 17:06:01

http://reply.papertrans.cn/24/2339/233878/233878_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Computer Security - ESORICS 96; 4th European Symposi Elisa Bertino,Helmut Kurth,Emilio Montolivo Conference proceedings 1996 Springer-Verla