artless 发表于 2025-3-28 18:01:43

https://doi.org/10.1007/978-3-663-09508-8ommon foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Envir

GULLY 发表于 2025-3-28 19:44:41

Daniel Lindmark,Erik J. Anderssonctivities (or tasks) in a workflow, task dependencies are specified among them. In a multilevel secure (MLS) workflow, tasks may belong to different security levels. Ensuring the task dependencies from the tasks at higher security levels to those at lower security level (high-to-low dependencies) ma

教义 发表于 2025-3-28 23:48:42

http://reply.papertrans.cn/27/2634/263384/263384_43.png

大骂 发表于 2025-3-29 06:07:02

Stefan Gelfgren,Daniel Lindmarkfor security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by . security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these

黑豹 发表于 2025-3-29 09:10:37

Women in the Political Backgrounde and reducing the storage required for indexing. At the bottom tier, our scheme requires separate single-level indices, one for each partition of the multilevel relation; at the top tier, our scheme requires a . multilevel index consisting of only those key values from the single-level indices that

Brocas-Area 发表于 2025-3-29 14:36:52

https://doi.org/10.1007/978-3-031-51205-6n the form of a deadline and is represented by a priority to be used by schedulers. In many real-time applications, security is another important requirement, since the system maintains sensitive information to be shared by multiple users with different levels of security clearance. As more advanced

努力赶上 发表于 2025-3-29 18:16:31

http://reply.papertrans.cn/27/2634/263384/263384_47.png

debble 发表于 2025-3-29 20:30:02

https://doi.org/10.1007/978-3-663-09508-8ODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.

SLING 发表于 2025-3-30 02:45:46

Book 1998This book aims to discuss in depth the current state ofresearch and practice in database security. It documents progress andprovidesresearchers and students with a broad perspective of recentdevelopments in what is recognised as a key topic in business and inthe public sector.

Evocative 发表于 2025-3-30 05:55:29

http://reply.papertrans.cn/27/2634/263384/263384_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Database Security XI; Status and Prospects T. Y. Lin,Shelly Qian Book 1998 IFIP International Federation for Information Processing 1998 Ac