个人长篇演说 发表于 2025-3-30 12:15:55

Susmit Jha,John Rushby,Natarajan Shankartification techniques to acquire a fingerprint of a computer over the Internet. The fingerprint includes identifying information about the operating system, banners, enumerations and services. Once the computer is seized, it is connected to a closed network and scanned again to produce a second fing

委屈 发表于 2025-3-30 12:27:03

http://reply.papertrans.cn/27/2633/263222/263222_52.png

Sigmoidoscopy 发表于 2025-3-30 17:40:34

Richard Hawkins,Philippa Ryan Conmysfying differentiated information assurance requirements of various database services under sustained attacks. This paper takes the first steps towards delivering database services with information assurance guarantees. In particular, (a) we introduce the concept of Quality of Integrity Assurance(Qo

Parabola 发表于 2025-3-30 21:03:08

http://reply.papertrans.cn/27/2633/263222/263222_54.png

cliche 发表于 2025-3-31 01:51:23

http://reply.papertrans.cn/27/2633/263222/263222_55.png

小木槌 发表于 2025-3-31 08:44:44

http://reply.papertrans.cn/27/2633/263222/263222_56.png

圆锥 发表于 2025-3-31 10:05:54

http://reply.papertrans.cn/27/2633/263222/263222_57.png

现代 发表于 2025-3-31 14:55:51

http://reply.papertrans.cn/27/2633/263222/263222_58.png

并入 发表于 2025-3-31 19:20:13

Computer Safety, Reliability, and Securitya of an organization or an individual, using only intentionally disclosed information. We propose a framework, called Ontology guided XML Security Engine (Oxsegin), to detect and prevent undesired inference attacks. Oxsegin uses the Correlated Inference Algorithm to detect sensitive associations tha

保守 发表于 2025-3-31 23:37:51

http://reply.papertrans.cn/27/2633/263222/263222_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data and Applications Security XVII; Status and Prospects Sabrina Capitani di Vimercati,Indrakshi Ray,Indraj Book 2004 IFIP International F