攀登 发表于 2025-3-28 18:24:16
http://reply.papertrans.cn/27/2633/263220/263220_41.png形容词 发表于 2025-3-28 21:40:30
http://reply.papertrans.cn/27/2633/263220/263220_42.pngcolloquial 发表于 2025-3-29 00:36:41
,Wrappers – A Mechanism to Support State-Based Authorization in Web Applications,ence on proper protection. The second premise is that applications are generally too complex to be trusted to implement security as specified by the given security policy. These problems are aggravated if the application operates over normal time and space constraints: The best example of such appli连累 发表于 2025-3-29 06:33:05
An Integrated Framework for Database Privacy Protection,generic database user. In this paper, we present a framework to assist in the formal analysis of the database inference problem. The framework is based on an association network which is composed of a similarity measure and a Bayesian network model.神圣不可 发表于 2025-3-29 10:14:01
http://reply.papertrans.cn/27/2633/263220/263220_45.png愚蠢人 发表于 2025-3-29 13:10:16
http://reply.papertrans.cn/27/2633/263220/263220_46.png装勇敢地做 发表于 2025-3-29 18:59:30
Confidentiality vs Integrity in Secure Databases,. To enforce confidentiality the majority of previous works either advocates a violation of integrity or proposes pragmatically its preservation or restoration. In this work we argue that there can never be a trade-off between these two properties for integrity is a fundamental quality of every datahemophilia 发表于 2025-3-29 23:12:38
,Extending SQL’s Grant Operation to Limit Privileges,rant/revoke security model that allows a grantor to impose limitations on how the received privilege may be used. This extension also has a non-traditional implication for view security. Although our examples are from DBMSs, most results apply to arbitrary sets of privileges, in non-database softwaravulsion 发表于 2025-3-30 00:00:06
http://reply.papertrans.cn/27/2633/263220/263220_49.png极少 发表于 2025-3-30 04:42:58
Jakub Smolka,Maria Skublewska-Paszkowskaorizations both at document type and document level; (ii) a differentiated protection of document/document type contents by supporting multi-granularity protection objects and positive/negative authorizations; (iii) a controlled propagation of authorizations among protection objects, by enforcing multiple propagation options.