Encephalitis 发表于 2025-4-1 04:54:57
Peter Schwabe,Douglas Stebila,Thom Wiggersout the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the first algorithm for this problem.Ptosis 发表于 2025-4-1 09:18:59
Computer Security – ESORICS 2020is also able to hide the number of keywords in a query as well as the number of keywords contained in an encrypted document. Our searchable encryption scheme is efficient and at the same time it is secure against the adaptive chosen keywords attack.