Evocative 发表于 2025-3-30 10:50:58

Automating Privacy Enforcement in Cloud Platformsds to policies and regulations about personal data protection is essential, but hard to achieve, as the implementation of privacy controls is subject to diverse kinds of errors. In this paper we present how the enforcement of privacy policies can be facilitated by a Platform as a Service. Cloud appl

Cardiac 发表于 2025-3-30 14:30:36

http://reply.papertrans.cn/27/2630/262993/262993_52.png

开花期女 发表于 2025-3-30 19:49:37

http://reply.papertrans.cn/27/2630/262993/262993_53.png

广告 发表于 2025-3-30 20:58:07

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcinges when the “. model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir’s secret

Generator 发表于 2025-3-31 03:48:07

http://reply.papertrans.cn/27/2630/262993/262993_55.png

才能 发表于 2025-3-31 07:57:55

Automated Smartphone Security Configurationd upon a modified version of the Linux OS. Notwithstanding traditional threats to mobile phones, threats to desktop environments are also applicable to smartphones. Management of security configurations for the end-user has, to date, been complex and error-prone. As a consequence, misconfiguration o

欢乐东方 发表于 2025-3-31 09:59:08

On the Detectability of Weak DoS Attacks in Wireless Sensor Networksos, it is desirable to use an auto-configuring anomaly detector. To accomodate the indeterministic wireless environment, the anomaly detection must also be able to adapt to changing conditions. This work presents a dynamic learning extension for a pre-exisiting, auto-configuring anomaly detection sy

helper-T-cells 发表于 2025-3-31 15:22:03

http://reply.papertrans.cn/27/2630/262993/262993_58.png

哺乳动物 发表于 2025-3-31 18:28:05

http://reply.papertrans.cn/27/2630/262993/262993_59.png

Fierce 发表于 2025-3-31 22:18:11

Alexander Chan,Tzipora Halevi,Nasir Memonich every principal has some data that is inaccessible to others. We introduce this new security model algebraically as a semi-lattice contrasting it to the foundations of lattice-based security models similar to Denning’s work. As a proof of concept we show how the model can be naturally interpreted for a calculus of active objects.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data Privacy Management and Autonomous Spontaneous Security; 7th International Wo Roberto Pietro,Javier Herranz,Radu State Conference proce