平淡而无味 发表于 2025-3-30 10:48:21
http://reply.papertrans.cn/47/4653/465262/465262_51.pngConsensus 发表于 2025-3-30 12:47:14
http://reply.papertrans.cn/47/4653/465262/465262_52.png创新 发表于 2025-3-30 20:12:21
Role-Based Access Control for E-commerce Sea-of-Data Applications systems one of the most feasible technologies to implement them. On the other hand mobile agent technologies are in a hot research state, spfiecially concerning security. We present an access control method for mobile agent systems. It is based on Role-based Access Control and trust management to p骨 发表于 2025-3-30 22:20:46
An Access Control Model for Tree Data Structures are literally as many access control schemes as there are tree data structures. Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to another kind of tree. In this paper, we propose an access control model for . tree data structures.Agnosia 发表于 2025-3-31 02:23:26
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKIire additional use of authorization services in order for users to prove what they are allowed to do. Attribute certificates have changed the way in which the authorization problem has been considered until now, and Privilege Management Infrastructures (PMI) provide the necessary support for a wide罗盘 发表于 2025-3-31 06:20:55
http://reply.papertrans.cn/47/4653/465262/465262_56.png编辑才信任 发表于 2025-3-31 11:25:11
Quantifying Privacy Leakage through Answering Database Querieslected population in the database can be submitted to the data center. The answers to the queries leak private information of individuals though no identification information is provided. Inspired by decision theory, we present a quantitative model for the privacy protection problem in such a databaMobile 发表于 2025-3-31 15:20:46
http://reply.papertrans.cn/47/4653/465262/465262_58.png幻想 发表于 2025-3-31 20:21:06
Receipt-Free Sealed-Bid Auctionhe scheme enjoys receipt-freeness, secrecy of bidding price and public verifiability and uses a chameleon bit-commitment technique. It requires a bidding booth and a one-way untappable channel from eachbidding boothto eachauctioneer.咒语 发表于 2025-4-1 01:20:44
http://reply.papertrans.cn/47/4653/465262/465262_60.png