脱水 发表于 2025-3-23 13:14:40

http://reply.papertrans.cn/27/2633/263225/263225_11.png

大看台 发表于 2025-3-23 14:20:21

P4A: A New Privacy Model for XMLrposes, recipients, retention period, and uses of data collection. Data providers share their private information with data collectors under restrictions specified by privacy preferences. P4A offers individualsmultiple options for restrictions such as conditional access, return results as range intervals for each data item and purpose.

infatuation 发表于 2025-3-23 18:55:22

http://reply.papertrans.cn/27/2633/263225/263225_13.png

Type-1-Diabetes 发表于 2025-3-23 23:20:01

http://reply.papertrans.cn/27/2633/263225/263225_14.png

天文台 发表于 2025-3-24 06:09:45

http://reply.papertrans.cn/27/2633/263225/263225_15.png

inhumane 发表于 2025-3-24 08:04:47

Conference proceedings 2008 UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 high-qualit

Audiometry 发表于 2025-3-24 12:22:14

0302-9743 in L- don, UK, July 13–16, 2008. This year’s working conference continued its tra- tion of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program that consists of 9 research paper s- sions with 22 h

Maximizer 发表于 2025-3-24 15:44:44

http://reply.papertrans.cn/27/2633/263225/263225_18.png

克制 发表于 2025-3-24 22:51:07

http://reply.papertrans.cn/27/2633/263225/263225_19.png

漂亮才会豪华 发表于 2025-3-25 01:31:38

On the Formal Analysis of a Spatio-temporal Role-Based Access Control Modelr access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a model for spatio-temporal-based access control is needed that increases the security of the application and ensures tha
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Data and Applications Security XXII; 22nd Annual IFIP WG Vijay Atluri Conference proceedings 2008 IFIP International Federation for Inform