锉屑 发表于 2025-4-1 03:03:40

Consolidating the Access Control of Composite Applications and Workflows, presented requirements of the least privileges paradigm and, thus, allow to revise and optimize the access control of composite applications. We demonstrate this by means of Web service workflows that constitute the state of the art for the realization of business processes.

ARCHE 发表于 2025-4-1 10:00:34

Authenticating Multi-dimensional Query Results in Data Publishing, approach: Verifiable KD-tree (VKDtree) that is based on space partitioning, and Verifiable R-tree (VRtree) that is based on data partitioning. The schemes are evaluated on window queries, and results show that VRtree is highly precise, meaning that few data points outside of a query result are disc
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Data and Applications Security XX; 20th Annual IFIP WG Ernesto Damiani,Peng Liu Conference proceedings 2006 IFIP International Federation