extinguish 发表于 2025-3-30 10:52:42

http://reply.papertrans.cn/27/2633/263226/263226_51.png

愤慨点吧 发表于 2025-3-30 13:59:00

http://reply.papertrans.cn/27/2633/263226/263226_52.png

Feckless 发表于 2025-3-30 20:22:41

Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providerson to ensure anonymity of data providers in addition to that of data subjects, and a distributed anonymization protocol that allows independent data providers to build a virtual anonymized database while maintaining both privacy constraints.

慢慢冲刷 发表于 2025-3-30 23:56:39

http://reply.papertrans.cn/27/2633/263226/263226_54.png

形状 发表于 2025-3-31 02:25:01

http://reply.papertrans.cn/27/2633/263226/263226_55.png

不能约 发表于 2025-3-31 05:43:50

http://reply.papertrans.cn/27/2633/263226/263226_56.png

多山 发表于 2025-3-31 13:14:58

Francisco de Asis López-Fuentesuirements which specify the reaction policy to enforce when intrusions are detected. We present in this article an extension of the OrBAC model by defining dynamic organizations and threat contexts to enable the expression and enforcement of reaction requirements.

Badger 发表于 2025-3-31 17:26:01

http://reply.papertrans.cn/27/2633/263226/263226_58.png

GRATE 发表于 2025-3-31 19:43:57

http://reply.papertrans.cn/27/2633/263226/263226_59.png

Flu表流动 发表于 2025-4-1 00:08:04

https://doi.org/10.1007/978-3-030-69839-3 failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants. Our analysis of the expected number of messages and the computational effort needed in PACS shows that its increased flexibility comes with an acceptable additional overhead.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data and Applications Security XXIII; 23rd Annual IFIP WG Ehud Gudes,Jaideep Vaidya Conference proceedings 2009 IFIP International Federat