和音 发表于 2025-3-25 04:50:36

Megha Quamara,Christina Kolb,Brahim Hamid different models are applicable (e.g., RBAC in organizations, MAC in the military field). An authorization model contains all necessary elements needed for the decision (e.g., subjects, objects, and roles) as well as their relations. As these elements are usually inherent in the software architectu

无法治愈 发表于 2025-3-25 09:33:10

Creating Objects in the Flexible Authorization Framework,control is necessary, but not sufficient. Actually, IT systems can manipulate data to provide services to users. The results of a data processing may disclose information concerning the objects used in the data processing itself. Therefore, the control of information flow results fundamental to guar

GREEN 发表于 2025-3-25 15:09:16

http://reply.papertrans.cn/27/2633/263223/263223_23.png

修饰 发表于 2025-3-25 18:20:21

http://reply.papertrans.cn/27/2633/263223/263223_24.png

灌输 发表于 2025-3-25 23:47:12

http://reply.papertrans.cn/27/2633/263223/263223_25.png

情感脆弱 发表于 2025-3-26 04:02:33

Authenticating Multi-dimensional Query Results in Data Publishing,le to attacks, it could produce incorrect query results. This paper introduces a mechanism for users to verify that their query answers on a . are correct, in the sense of being complete (i.e., no qualifying data points are omitted) and authentic (i.e., all the result values originated from the owne

橡子 发表于 2025-3-26 06:41:02

, Streams Watermarking,g is a known technique for hiding copyrights marks within documents, thus preventing redistributions. Here, we introduce a watermarking algorithm for . streams so that (i) the watermark embedding and detection processes are done online and use only a constant memory, (ii) the stream distortion is co

狼群 发表于 2025-3-26 11:13:20

Aggregation Queries in the Database-As-a-Service Model,intain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data. One prominent and fairly effective technique for executing SQL-style range queries over encrypted data involves partiti

gain631 发表于 2025-3-26 13:44:54

http://reply.papertrans.cn/27/2633/263223/263223_29.png

愤世嫉俗者 发表于 2025-3-26 17:41:41

http://reply.papertrans.cn/27/2633/263223/263223_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Data and Applications Security XX; 20th Annual IFIP WG Ernesto Damiani,Peng Liu Conference proceedings 2006 IFIP International Federation