HAUNT 发表于 2025-3-30 08:32:46

http://reply.papertrans.cn/27/2633/263232/263232_51.png

吝啬性 发表于 2025-3-30 15:58:40

Optimizing Integrity Checks for Join Queries in the Cloud,osal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.

杀死 发表于 2025-3-30 20:24:35

Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud,es queries on Kd-trees that are constructed from encrypted health records. It also prevents patients from inferring what health organizations are concerned about. We experimentally evaluate the performance of the proposed protocol and report on the results of implementation.

Ballad 发表于 2025-3-31 00:41:59

http://reply.papertrans.cn/27/2633/263232/263232_54.png

Ingratiate 发表于 2025-3-31 04:42:59

Toward Software Diversity in Heterogeneous Networked Systems,in more complex scenarios by taking into consideration practical constraints, e.g., hosts may have diverse requirements based on different system prerequisites. We evaluate the performance of our algorithm through simulations on both simple and complex system models. The results confirm the effectiveness and scalability of our algorithm.

印第安人 发表于 2025-3-31 08:31:40

Design Patterns for Multiple Stakeholders in Social Computing,gnificant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.

slow-wave-sleep 发表于 2025-3-31 11:03:48

Incremental Analysis of Evolving Administrative Role Based Access Control Policies,ne on the previous problem in a sequence. An experimental evaluation shows the better performances of an implementation of our technique with respect to the only available approach to solve safety problems for evolving ARBAC policies proposed by Gofman, Luo, and Yang.

A精确的 发表于 2025-3-31 14:30:09

Attribute-Aware Relationship-Based Access Control for Online Social Networks,hip-based access control (UURAC) model proposed in is extended to enable such attribute-aware access control. We also present an enhanced path-checking algorithm to determine the existence of the required attributes and relationships in order to grant access.

Myocarditis 发表于 2025-3-31 20:22:06

0302-9743 nd Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cl

Malfunction 发表于 2025-4-1 01:20:21

Hui Guo,Zhenfeng Zhang,Jing Xu,Mingyuan Xiae formalization of security and utility requirements and security mechanisms properties, we formally identify the best mechanisms, and the best way to combine them to get the best trade-off between utility and security.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Data and Applications Security and Privacy XXVIII; 28th Annual IFIP WG Vijay Atluri,Günther Pernul Conference proceedings 2014 IFIP Intern