Mosaic 发表于 2025-3-30 08:48:37

Ibrahim Habli,Mark Sujan,Friedemann Bitsch the multilevel security system of the federation, and the translation functions between each ordered set belonging to each component database and the federated ordered set as well. The proposed methodology also includes a way to solve the problem of classification of the components of the Federated Schema generated during the integration process.

ALIBI 发表于 2025-3-30 15:32:23

Author-,: A Java-Based System For XML Data Protection,orizations both at document type and document level; (ii) a differentiated protection of document/document type contents by supporting multi-granularity protection objects and positive/negative authorizations; (iii) a controlled propagation of authorizations among protection objects, by enforcing multiple propagation options.

松果 发表于 2025-3-30 16:40:13

http://reply.papertrans.cn/27/2633/263220/263220_53.png

FLOUR 发表于 2025-3-30 22:36:28

http://reply.papertrans.cn/27/2633/263220/263220_54.png

小教堂 发表于 2025-3-31 01:33:50

http://reply.papertrans.cn/27/2633/263220/263220_55.png

幸福愉悦感 发表于 2025-3-31 07:17:21

Security Architecture of The Multimedia Mediator,tion attributes and return encrypted answers. The security module uniformly represents the query access authorizations of the sources, controls the intermediate usage of credentials, assists users in submitting appropriate credentials, selects and forwards credentials for subqueries, and exploits credentials for query optimization.

发表于 2025-3-31 10:00:22

Confidentiality vs Integrity in Secure Databases,base, ie also a secure one. Confidentiality always implies a kind of distortion of the open database. We introduce a formally sound method for its enforcement which relies on aliases, ie, additional tuples the only purpose of which is the preservation of integrity of both the open database and each distortion of it.

爱了吗 发表于 2025-3-31 15:55:33

Book 2001 the rapid growth of the internet and theworld wide web, data and applications security will always be a keytopic in industry as well as in the public sector, and hasimplications for the whole of society. ..Data and Applications Security. covers issues related to securityand privacy of information i

largesse 发表于 2025-3-31 20:45:46

Lecture Notes in Computer Scienceication of security requirements to be exploited to help to improve the efficiency of query evaluation, and naturally extends to enable deductive databases to be protected against unauthorized update and revision requests.

contrast-medium 发表于 2025-4-1 00:32:46

http://reply.papertrans.cn/27/2633/263220/263220_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data and Application Security; Developments and Dir Bhavani Thuraisingham,Reind Riet,Zahir Tari Book 2001 IFIP International Federation for