acolyte 发表于 2025-3-28 17:26:01

http://reply.papertrans.cn/32/3110/310932/310932_41.png

exquisite 发表于 2025-3-28 19:16:52

Preserving Data Privacy in e-Health,hase of policy generation, ., a user-friendly authoring tool allowing definition of privacy preferences in natural language, a formal analysis tool to detect conflicts among policies, and a conflict solver implementing a solution strategy that privileges the most specific policy among a set of conflicting ones.

教唆 发表于 2025-3-29 01:57:52

Model-Driven Development of a Secure eHealth Application,urance checks, where the properties proven about the models transfer to the generated applications. Finally, for data-management applications, the ActionGUI tool automatically generates complete, ready-to-deploy, security-aware, web applications. We explain these features in the context of the eHealth application.

和平 发表于 2025-3-29 04:18:31

On the Synthesis of Secure Services Composition,ecure service orchestrators that are also able to exploit some cryptographic primitives. We also show two implementations able to automatically generate an orchestrator process that composes several services in such a way to guarantee both functional and security requirements.

妨碍议事 发表于 2025-3-29 08:22:02

http://reply.papertrans.cn/32/3110/310932/310932_45.png

蒙太奇 发表于 2025-3-29 11:55:48

http://reply.papertrans.cn/32/3110/310932/310932_46.png

颂扬国家 发表于 2025-3-29 19:39:07

https://doi.org/10.1007/978-1-349-18224-4chapter is the discussion of the challenges we faced during our experimental work. Contextually, we also outline those solutions that worked out in our studies and could be reused in the field by other studies.

没有贫穷 发表于 2025-3-29 23:26:35

https://doi.org/10.1007/978-981-10-4846-3s and their execution against the XACML policy; (iii) the assessment of compliance between the XACML policy execution and the access control model. In addition, we illustrate the use of the ACT toolchain on a case study.

Unsaturated-Fat 发表于 2025-3-30 00:34:25

https://doi.org/10.1007/978-1-4613-8443-4s and guidelines necessary for establishing an Information Security Management System (ISMS) compliance with the standard, as well as the artifacts that are needed for the required documentation. We validate the method by applying it to a scenario from the smart grid domain.

CRAFT 发表于 2025-3-30 05:23:18

http://reply.papertrans.cn/32/3110/310932/310932_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Engineering Secure Future Internet Services and Systems; Current Research Maritta Heisel,Wouter Joosen,Fabio Martinelli Book 2014 Springer