关心 发表于 2025-3-28 18:33:09
http://reply.papertrans.cn/47/4656/465528/465528_41.png反对 发表于 2025-3-28 19:14:39
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Eallows for formally modeling these services in a typed first-order logic and for inferring privacy properties that can be interpreted by all the stakeholders including consumers. The inference strategy consists of compiling user profiles according to the expectations of the consumer about the data pdeficiency 发表于 2025-3-29 02:41:18
http://reply.papertrans.cn/47/4656/465528/465528_43.png结合 发表于 2025-3-29 04:47:21
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management, has become a paramount necessity. Still, the management of manually configured firewall rules is complex, error prone, and costly for large networks. The use of high abstract models such as role based access control RBAC has proved to be very efficient in the definition and management of access conCRAFT 发表于 2025-3-29 09:25:07
http://reply.papertrans.cn/47/4656/465528/465528_45.pngsulcus 发表于 2025-3-29 12:11:06
Monitoring for Slow Suspicious Activities Using a Target Centric Approach, collusion and source address spoofing are common. Effective attribution of attacks therefore is a real challenge. To address this we propose an approach to utilise destination information of activities together with a data fusion technique to combine the output of several information sources to a sforebear 发表于 2025-3-29 16:31:31
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers, (SPN) based symmetric ciphers. The framework tries to bridge the gap between the designer of cryptographic schemes and the VLSI implementation engineers of that cryptographic systems. Using a GUI-based interface the user has the freedom either to choose a well-known Feistel or SPN based cryptosyste保全 发表于 2025-3-29 21:16:50
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach, session making it infeasible for the adversary to anticipate the common channel to be used by a particular pair of nodes. We show these protocols using combinatorial designs performs better than existing anti-jamming protocol.类似思想 发表于 2025-3-30 02:26:44
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Sm-factor remote user authentication and also fails to satisfy key security attributes. Further, the article presents an improved anonymous authentication scheme which eliminates all the drawbacks of An’s and Li et al.’s scheme. Moreover, proposed scheme presents efficient login and password change mePessary 发表于 2025-3-30 06:48:20
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management,n this paper, we propose an extension of role mining techniques to facilitate the adoption of a model based framework in the management of network access control. We present policy mining, a bottom-up approach that extracts instances of the NS-RBAC model from the deployed rules on a firewall. We pro