musicologist 发表于 2025-3-28 16:24:55

Incremental Analysis of Evolving Administrative Role Based Access Control Policies,ns can result in policies by which a user can acquire permissions that may compromise some security goals. In particular, we are interested in sequences of safety problems generated by modifications (namely, adding/deleting an element to/from the set of possible actions) to an ARBAC policy accommoda

结果 发表于 2025-3-28 22:37:05

Mining Attribute-Based Access Control Policies from Logs,ms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute

放肆的我 发表于 2025-3-29 02:30:40

Attribute-Aware Relationship-Based Access Control for Online Social Networks,thorization policies are typically specified in terms of relationships of certain types and/or depth between the access requester and the target. However, using relationships alone is often not sufficient to enforce various security and privacy requirements that meet the expectation fromtoday’sOSN u

CT-angiography 发表于 2025-3-29 06:12:50

Hunting the Unknown,, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain . a given query is anomalous, which further boosts the practical applicability of the system.

发表于 2025-3-29 08:18:58

https://doi.org/10.1007/978-3-030-29959-0osal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.

缺乏 发表于 2025-3-29 13:01:53

http://reply.papertrans.cn/27/2633/263232/263232_46.png

口味 发表于 2025-3-29 16:20:11

Robert Lyerly,Xiaoguang Wang,Binoy Ravindranhe ability to identify the data subjects of the leaked information. To specify and reason on data sensitivity in an application domain, we propose a data model representing the knowledge in the domain. We validate our approach by analyzing data leakages within a healthcare environment.

来就得意 发表于 2025-3-29 22:25:41

http://reply.papertrans.cn/27/2633/263232/263232_48.png

DALLY 发表于 2025-3-30 00:13:59

Computer Security – ESORICS 2020gnificant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.

浪费物质 发表于 2025-3-30 04:11:12

http://reply.papertrans.cn/27/2633/263232/263232_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Data and Applications Security and Privacy XXVIII; 28th Annual IFIP WG Vijay Atluri,Günther Pernul Conference proceedings 2014 IFIP Intern