平淡而无味
发表于 2025-3-30 10:48:21
http://reply.papertrans.cn/47/4653/465262/465262_51.png
Consensus
发表于 2025-3-30 12:47:14
http://reply.papertrans.cn/47/4653/465262/465262_52.png
创新
发表于 2025-3-30 20:12:21
Role-Based Access Control for E-commerce Sea-of-Data Applications systems one of the most feasible technologies to implement them. On the other hand mobile agent technologies are in a hot research state, spfiecially concerning security. We present an access control method for mobile agent systems. It is based on Role-based Access Control and trust management to p
骨
发表于 2025-3-30 22:20:46
An Access Control Model for Tree Data Structures are literally as many access control schemes as there are tree data structures. Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to another kind of tree. In this paper, we propose an access control model for . tree data structures.
Agnosia
发表于 2025-3-31 02:23:26
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKIire additional use of authorization services in order for users to prove what they are allowed to do. Attribute certificates have changed the way in which the authorization problem has been considered until now, and Privilege Management Infrastructures (PMI) provide the necessary support for a wide
罗盘
发表于 2025-3-31 06:20:55
http://reply.papertrans.cn/47/4653/465262/465262_56.png
编辑才信任
发表于 2025-3-31 11:25:11
Quantifying Privacy Leakage through Answering Database Querieslected population in the database can be submitted to the data center. The answers to the queries leak private information of individuals though no identification information is provided. Inspired by decision theory, we present a quantitative model for the privacy protection problem in such a databa
Mobile
发表于 2025-3-31 15:20:46
http://reply.papertrans.cn/47/4653/465262/465262_58.png
幻想
发表于 2025-3-31 20:21:06
Receipt-Free Sealed-Bid Auctionhe scheme enjoys receipt-freeness, secrecy of bidding price and public verifiability and uses a chameleon bit-commitment technique. It requires a bidding booth and a one-way untappable channel from eachbidding boothto eachauctioneer.
咒语
发表于 2025-4-1 01:20:44
http://reply.papertrans.cn/47/4653/465262/465262_60.png