BOAST 发表于 2025-3-26 21:16:06
http://reply.papertrans.cn/47/4692/469166/469166_31.pngIntend 发表于 2025-3-27 03:51:04
Integrity and Internal Control in Information Systems V978-0-387-35693-8Series ISSN 1868-4238 Series E-ISSN 1868-422X让你明白 发表于 2025-3-27 05:54:54
https://doi.org/10.1007/978-0-387-35693-8Audit; Processing; Web Services; control; data security; database; databases; information; information securaggressor 发表于 2025-3-27 12:12:35
http://reply.papertrans.cn/47/4692/469166/469166_34.png关心 发表于 2025-3-27 14:48:39
http://reply.papertrans.cn/47/4692/469166/469166_35.png放肆的我 发表于 2025-3-27 19:57:02
http://reply.papertrans.cn/47/4692/469166/469166_36.png公共汽车 发表于 2025-3-28 01:09:38
http://reply.papertrans.cn/47/4692/469166/469166_37.png侵略者 发表于 2025-3-28 05:24:19
Increasing the Accuracy of Time-Tabled Condition Monitoringve this typically impose a performance overhead that the owners and users of such systems may be unwilling to accept. A compromise solution is to allow system owners to decide at what times they will allow computational resources to be given over to condition monitoring and at what times they will nAcetabulum 发表于 2025-3-28 10:20:35
Designing High Integrity Systems Using Aspectshe specific mechanisms required for high integrity systems. To support this activity we have developed an initial tabulation of different kinds of threats and the mechanisms used to prevent, detect, and recover from the related attacks and problems. Each mechanism can be modeled independently as an使熄灭 发表于 2025-3-28 13:35:50
Towards Effect Preservation of Updates with Loopsutomatic generation and extention of given actions holds a danger — The original intention of actions might get canceled or even reversed, e.g. by some appended repairing action enforcing an integrity constraint. This problem might cause non-desired situations where an action commits although one of