aphasia 发表于 2025-3-28 16:47:32

Model-Based Refinement of Security Policies in Collaborative Virtual Organisationsation results in deployable policies referring to at most a single resource, hence avoiding the problem of cross-domain intereference. The applicability of our approach is demonstrated within the domain of distributed geographic map processing.

chemoprevention 发表于 2025-3-28 20:36:11

http://reply.papertrans.cn/32/3110/310941/310941_42.png

coagulation 发表于 2025-3-28 23:33:50

http://reply.papertrans.cn/32/3110/310941/310941_43.png

brassy 发表于 2025-3-29 05:17:11

http://reply.papertrans.cn/32/3110/310941/310941_44.png

切割 发表于 2025-3-29 09:18:55

http://reply.papertrans.cn/32/3110/310941/310941_45.png

ETCH 发表于 2025-3-29 11:40:31

Authorization Enforcement Usability Case Studyt. We show that authorization is a significant aspect in software development and that the effort can be reduced through appropriate authorization frameworks. Lastly, we formulate advice on the design of enforcement APIs.

做事过头 发表于 2025-3-29 18:07:01

The Dynamics of Change in Southern Africa (un)installations and policy changes in an incremental fashion. We sketch the application of our approach and its security enhancements on a multi-application use case for GlobalPlatform/Java Card smart cards.

北京人起源 发表于 2025-3-29 21:38:14

http://reply.papertrans.cn/32/3110/310941/310941_48.png

模范 发表于 2025-3-30 01:34:58

http://reply.papertrans.cn/32/3110/310941/310941_49.png

transient-pain 发表于 2025-3-30 07:18:04

http://reply.papertrans.cn/32/3110/310941/310941_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Engineering Secure Software and Systems; Third International Úlfar Erlingsson,Roel Wieringa,Nicola Zannone Conference proceedings 2011 Spr