中和 发表于 2025-4-1 02:12:59
Open Issues in Formal Methods for Cryptographic Protocol Analysisose tools can also be applied to these problems with good results. However, with this better understanding of the field comes new problems that strain against the limits of the existing tools. In this talk we will outline some of these new problem areas, and describe what new research needs to be done to to meet the challenges posed.SIT 发表于 2025-4-1 06:50:34
http://reply.papertrans.cn/47/4650/465000/465000_62.png首创精神 发表于 2025-4-1 10:19:23
Secure Systems Design Technologygn and development are proposed, forming a basis for secure information technologies development. Proposed technology and concepts can be applied from application tools and information systems design to operating system.Eclampsia 发表于 2025-4-1 15:59:10
http://reply.papertrans.cn/47/4650/465000/465000_64.pngHAIRY 发表于 2025-4-1 18:36:08
Analyzing Separation of Duties in Petri Net Workflowsn. This paper introduces a model for separation of duties in workflows that have been specified with Petri nets. Rules will be given as facts of a logic program and expressed in propositional logic. The program allows for simulating and analyzing workflows and their security rules during build time.Spina-Bifida 发表于 2025-4-1 23:55:51
Information Security with Formal Immune Networksspread artificial neural networks or intelligent agents. We consider also the main distinctions of our approach from the modern information security by agent-based modeling and artificial immune systems.吸引力 发表于 2025-4-2 05:34:26
http://reply.papertrans.cn/47/4650/465000/465000_67.png