柳树;枯黄 发表于 2025-4-1 04:02:58

Arijit Ukil,Jaydip Sen,Sumit Ghoshtio-temporal information. We formalize the model by enumerating the constraints. This model can be used for applications where spatial and temporal information of a subject and an object must be taken into account before granting or denying access.

变化 发表于 2025-4-1 06:58:16

Lei Xiangdong,Lei Zhenyang,Long Junic protocol is proposed to formalize the interactions between the users platform and database server. Any existing inference control technique can work with our protocol, for which the security properties are formally proven. Since each user’s platform enforces inference control for its own queries, our solution avoids the bottleneck.

辩论的终结 发表于 2025-4-1 14:10:50

http://reply.papertrans.cn/27/2633/263224/263224_63.png

慢跑 发表于 2025-4-1 16:02:02

http://reply.papertrans.cn/27/2633/263224/263224_64.png

羊栏 发表于 2025-4-1 19:12:30

A Privacy-Enhanced Attribute-Based Access Control System our infrastructure enables the deployment of alternative PDPs the service requestor can choose from. We employ a PKI to reflect the sufficient trust relation between the service provider and a potential PDP. Our work is carried out within the European research project Access-eGov that aims at a European-wide e-Government service platform.

AGATE 发表于 2025-4-2 00:03:47

gVault: A Gmail Based Cryptographic Network File Systemmodel and key management techniques that ensure data confidentiality and integrity. An initial prototype of gVault is implemented to evaluate the feasibility of such a system. Our experiments indicate that the additional cost of security is negligible in comparison to the cost of data transfer.

antiquated 发表于 2025-4-2 05:48:46

http://reply.papertrans.cn/27/2633/263224/263224_67.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Data and Applications Security XXI; 21st Annual IFIP WG Steve Barker,Gail-Joon Ahn Conference proceedings 2007 IFIP International Federati