围巾 发表于 2025-3-28 16:43:43

María Alejandra Zangara,Cecilia Sanzudget. Security evaluation standards, such as Common Criteria and ISO/IEC 17799, cannot be used due to resource limitations, time-to-market, and other constraints. We propose an alternative time and cost effective approach for predicting the security level of a security solution using information so

GLIDE 发表于 2025-3-28 18:50:57

http://reply.papertrans.cn/27/2633/263227/263227_42.png

格子架 发表于 2025-3-29 02:40:34

https://doi.org/10.1007/978-3-319-75214-3oduce new and amplify existing security and privacy problems. This is especially critical in the emerging field of enterprise Mashups. Despite several contributions in the field of Mashup security the issue of protecting exchanged resources against the Mashup-providing Platform has generally been ne

热心 发表于 2025-3-29 03:26:03

Numeric Line: A Códimo’s Activity information, these systems are highly interesting to attackers and special care needs to be taken to prevent them from malicious accesses. In this paper, we propose (..), an extension of the NIST RBAC (Role-Based Access Control) standard with the notions of application, application profile and sub-

STALL 发表于 2025-3-29 11:18:54

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/263227.jpg

acquisition 发表于 2025-3-29 13:18:56

Data and Applications Security and Privacy XXIV978-3-642-13739-6Series ISSN 0302-9743 Series E-ISSN 1611-3349

Verify 发表于 2025-3-29 18:03:01

https://doi.org/10.1007/978-3-662-68313-2 first contribution is to improve an existing cryptographic access control mechanism for scalable multimedia formats. We then show how our methods can be applied to a chain partition to develop alternative mechanisms for scalable multimedia formats and how these methods can themselves be extended to create a new type of key assignment scheme.

HACK 发表于 2025-3-29 23:06:36

https://doi.org/10.1007/978-3-642-13739-6Protection; RFID; access control; anonymity; authentication; automata; control; database; management; modelli

基因组 发表于 2025-3-30 03:17:19

978-3-642-13738-9IFIP International Federation for Information Processing 2010

Parabola 发表于 2025-3-30 04:47:11

http://reply.papertrans.cn/27/2633/263227/263227_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Data and Applications Security and Privacy XXIV; 24th Annual IFIP WG Sara Foresti,Sushil Jajodia Conference proceedings 2010 IFIP Internat