incubus 发表于 2025-3-23 12:35:39

http://reply.papertrans.cn/27/2633/263231/263231_11.png

gout109 发表于 2025-3-23 15:33:39

A Model for Trust-Based Access Control and Delegation in Mobile Cloudsaccess control model with delegation for providing fine-grained access control. Our model incorporates the notion of trust in the Role-Based Access Control (RBAC) model and also formalizes the concept of trustworthy delegation.

AWRY 发表于 2025-3-23 19:32:06

Database Fragmentation with Encryption: Under Which Semantic Constraints and A Priori Knowledge Can edly and then proved to be confidentiality preserving, even if an attacker employs some restricted but nevertheless versatile class of a priori knowledge to draw inferences. Finally, a method to compute a secure fragmentation schema is developed.

刚开始 发表于 2025-3-23 22:38:45

Result Integrity Verification of Outsourced Frequent Itemset Miningrify that the server returned correct mining result? In this paper, we focus on the problem of frequent itemset mining, and propose efficient and practical probabilistic verification approaches to check whether the server has returned correct and complete frequent itemsets.

LUMEN 发表于 2025-3-24 04:16:41

http://reply.papertrans.cn/27/2633/263231/263231_15.png

deciduous 发表于 2025-3-24 07:26:00

http://reply.papertrans.cn/27/2633/263231/263231_16.png

CULP 发表于 2025-3-24 13:41:04

http://reply.papertrans.cn/27/2633/263231/263231_17.png

Entropion 发表于 2025-3-24 15:37:00

http://reply.papertrans.cn/27/2633/263231/263231_18.png

垄断 发表于 2025-3-24 22:17:24

Arithmetic Garbling from Bilinear Maps provide decision makers with the necessary decision support. The approach comes with the necessary modeling support, a calculus for reasoning about the countermeasure cost and effect, as well as means for visualization of the results to aid decision makers.

Proponent 发表于 2025-3-25 00:31:56

Conference proceedings 20132013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Data and Applications Security and Privacy XXVII; 27th Annual IFIP WG Lingyu Wang,Basit Shafiq Conference proceedings 2013 IFIP Internatio