savage
发表于 2025-3-30 10:08:07
http://reply.papertrans.cn/27/2633/263230/263230_51.png
NOMAD
发表于 2025-3-30 12:23:46
978-3-642-31539-8IFIP International Federation for Information Processing 2012
Aboveboard
发表于 2025-3-30 18:26:45
Logics for Security and Privacyo reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese.
Hyperplasia
发表于 2025-3-30 20:46:48
A Friendly Framework for Hidding , for Java Based Smartcard-card using a laser beam to become mutant applications or .. We propose a framework for manipulating binary applications to design viruses for smart cards. We present development, experimentation and an example of this kind of virus.
GRILL
发表于 2025-3-31 04:38:21
From MDM to DB2: A Case Study of Security Enforcement Migrationileges and the least common mechanism. We explore the challenges of such migration and implement it in an industrial setting in a context of master data management where data security, privacy and audit are subject to regulatory compliance. Based on our implementation, we propose a general, standards-driven migration methodology.
Fluctuate
发表于 2025-3-31 07:01:30
http://reply.papertrans.cn/27/2633/263230/263230_56.png
AMBI
发表于 2025-3-31 10:13:04
http://reply.papertrans.cn/27/2633/263230/263230_57.png
Pepsin
发表于 2025-3-31 14:26:57
http://reply.papertrans.cn/27/2633/263230/263230_58.png
胎儿
发表于 2025-3-31 19:09:14
http://reply.papertrans.cn/27/2633/263230/263230_59.png
cyanosis
发表于 2025-3-31 22:27:51
http://reply.papertrans.cn/27/2633/263230/263230_60.png