Encephalitis 发表于 2025-4-1 04:54:57

Peter Schwabe,Douglas Stebila,Thom Wiggersout the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute data. To the best of our knowledge, it is the first algorithm for this problem.

Ptosis 发表于 2025-4-1 09:18:59

Computer Security – ESORICS 2020is also able to hide the number of keywords in a query as well as the number of keywords contained in an encrypted document. Our searchable encryption scheme is efficient and at the same time it is secure against the adaptive chosen keywords attack.
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Data and Applications Security and Privacy XXVIII; 28th Annual IFIP WG Vijay Atluri,Günther Pernul Conference proceedings 2014 IFIP Intern