savage 发表于 2025-3-30 10:08:07

http://reply.papertrans.cn/27/2633/263230/263230_51.png

NOMAD 发表于 2025-3-30 12:23:46

978-3-642-31539-8IFIP International Federation for Information Processing 2012

Aboveboard 发表于 2025-3-30 18:26:45

Logics for Security and Privacyo reason about privacy policies, and finally I discuss the use of modal logic for access control. This presentation is based on joint work with Guillaume Aucher, Guido Boella, Jan Broersen, Dov Gabbay and Valerio Genovese.

Hyperplasia 发表于 2025-3-30 20:46:48

A Friendly Framework for Hidding , for Java Based Smartcard-card using a laser beam to become mutant applications or .. We propose a framework for manipulating binary applications to design viruses for smart cards. We present development, experimentation and an example of this kind of virus.

GRILL 发表于 2025-3-31 04:38:21

From MDM to DB2: A Case Study of Security Enforcement Migrationileges and the least common mechanism. We explore the challenges of such migration and implement it in an industrial setting in a context of master data management where data security, privacy and audit are subject to regulatory compliance. Based on our implementation, we propose a general, standards-driven migration methodology.

Fluctuate 发表于 2025-3-31 07:01:30

http://reply.papertrans.cn/27/2633/263230/263230_56.png

AMBI 发表于 2025-3-31 10:13:04

http://reply.papertrans.cn/27/2633/263230/263230_57.png

Pepsin 发表于 2025-3-31 14:26:57

http://reply.papertrans.cn/27/2633/263230/263230_58.png

胎儿 发表于 2025-3-31 19:09:14

http://reply.papertrans.cn/27/2633/263230/263230_59.png

cyanosis 发表于 2025-3-31 22:27:51

http://reply.papertrans.cn/27/2633/263230/263230_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data and Applications Security and Privacy XXVI; 26th Annual IFIP WG Nora Cuppens-Boulahia,Frédéric Cuppens,Joaquin Gar Conference proceed