结构 发表于 2025-3-30 11:23:09

http://reply.papertrans.cn/47/4654/465325/465325_51.png

conservative 发表于 2025-3-30 15:53:12

Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applicationsality test on . is much more time-consuming than the random number generation and thus it occupies most of the running time of the prime generation. To reduce the running time of the primality test, real applications combine several primality test methods. The most widely used combination is the com

Vldl379 发表于 2025-3-30 17:33:34

http://reply.papertrans.cn/47/4654/465325/465325_53.png

阻塞 发表于 2025-3-30 22:06:48

http://reply.papertrans.cn/47/4654/465325/465325_54.png

法官 发表于 2025-3-31 03:17:03

http://reply.papertrans.cn/47/4654/465325/465325_55.png

Entropion 发表于 2025-3-31 06:16:11

Security On-demand Architecture with Multiple Modules Supportieved by supporting diverse security modules, invoking them on demand. However, the security architectures of existing projects on Linux kernels do not support this feature or have some drawbacks in their supporting. Thus we introduce a layered architecture which consists of original kernel layer, m

debunk 发表于 2025-3-31 10:55:30

Measuring Resistance to Social Engineering wouldn’t have. Typically this includes making the victims disclose passwords, or give the adversary illegitimate access to buildings or privileged information. The book . by Kevin Mitnick gives several examples of potential attacks. Clearly, countermeasures are needed. Countermeasures may include s

培养 发表于 2025-3-31 14:58:11

Conformance Checking of RBAC Policy and its Implementationicy and its implementation might be altered, and after introducing changes, it is not obvious that they are consistent. Therefore, we need to validate conformance between policy and its implementation. In this paper we describe an approach based on finite-model checking to verify that a RBAC impleme

Comedienne 发表于 2025-3-31 20:22:29

http://reply.papertrans.cn/47/4654/465325/465325_59.png

gratify 发表于 2025-3-31 22:53:55

A Task-Oriented Access Control Model for WfMS to users dynamically while business processes are being executed., We propose a Take-Oriented Access Control (TOAC) model based on RBAC to remedy this problem. In TOAC, permissions are associated with tasks as well as roles. Users can get permissions through tasks that they carry out in certain pro
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security Practice and Experience; First International Robert H. Deng,Feng Bao,Jianying Zhou Conference proceedings 2005 Spring