平淡而无味 发表于 2025-3-30 10:48:21

http://reply.papertrans.cn/47/4653/465262/465262_51.png

Consensus 发表于 2025-3-30 12:47:14

http://reply.papertrans.cn/47/4653/465262/465262_52.png

创新 发表于 2025-3-30 20:12:21

Role-Based Access Control for E-commerce Sea-of-Data Applications systems one of the most feasible technologies to implement them. On the other hand mobile agent technologies are in a hot research state, spfiecially concerning security. We present an access control method for mobile agent systems. It is based on Role-based Access Control and trust management to p

发表于 2025-3-30 22:20:46

An Access Control Model for Tree Data Structures are literally as many access control schemes as there are tree data structures. Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to another kind of tree. In this paper, we propose an access control model for . tree data structures.

Agnosia 发表于 2025-3-31 02:23:26

A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKIire additional use of authorization services in order for users to prove what they are allowed to do. Attribute certificates have changed the way in which the authorization problem has been considered until now, and Privilege Management Infrastructures (PMI) provide the necessary support for a wide

罗盘 发表于 2025-3-31 06:20:55

http://reply.papertrans.cn/47/4653/465262/465262_56.png

编辑才信任 发表于 2025-3-31 11:25:11

Quantifying Privacy Leakage through Answering Database Querieslected population in the database can be submitted to the data center. The answers to the queries leak private information of individuals though no identification information is provided. Inspired by decision theory, we present a quantitative model for the privacy protection problem in such a databa

Mobile 发表于 2025-3-31 15:20:46

http://reply.papertrans.cn/47/4653/465262/465262_58.png

幻想 发表于 2025-3-31 20:21:06

Receipt-Free Sealed-Bid Auctionhe scheme enjoys receipt-freeness, secrecy of bidding price and public verifiability and uses a chameleon bit-commitment technique. It requires a bidding booth and a one-way untappable channel from eachbidding boothto eachauctioneer.

咒语 发表于 2025-4-1 01:20:44

http://reply.papertrans.cn/47/4653/465262/465262_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security; 5th International Co Agnes Hui Chan,Virgil Gligor Conference proceedings 2002 Springer-Verlag Berlin Heidelberg 2002