savage 发表于 2025-3-30 10:08:07
http://reply.papertrans.cn/27/2633/263230/263230_51.pngNOMAD 发表于 2025-3-30 12:23:46
978-3-642-31539-8IFIP International Federation for Information Processing 2012Aboveboard 发表于 2025-3-30 18:26:45
Logics for Security and Privacyo reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese.Hyperplasia 发表于 2025-3-30 20:46:48
A Friendly Framework for Hidding , for Java Based Smartcard-card using a laser beam to become mutant applications or .. We propose a framework for manipulating binary applications to design viruses for smart cards. We present development, experimentation and an example of this kind of virus.GRILL 发表于 2025-3-31 04:38:21
From MDM to DB2: A Case Study of Security Enforcement Migrationileges and the least common mechanism. We explore the challenges of such migration and implement it in an industrial setting in a context of master data management where data security, privacy and audit are subject to regulatory compliance. Based on our implementation, we propose a general, standards-driven migration methodology.Fluctuate 发表于 2025-3-31 07:01:30
http://reply.papertrans.cn/27/2633/263230/263230_56.pngAMBI 发表于 2025-3-31 10:13:04
http://reply.papertrans.cn/27/2633/263230/263230_57.pngPepsin 发表于 2025-3-31 14:26:57
http://reply.papertrans.cn/27/2633/263230/263230_58.png胎儿 发表于 2025-3-31 19:09:14
http://reply.papertrans.cn/27/2633/263230/263230_59.pngcyanosis 发表于 2025-3-31 22:27:51
http://reply.papertrans.cn/27/2633/263230/263230_60.png