婚姻生活 发表于 2025-3-23 11:48:42

http://reply.papertrans.cn/47/4692/469167/469167_11.png

个人长篇演说 发表于 2025-3-23 14:32:49

http://reply.papertrans.cn/47/4692/469167/469167_12.png

LAIR 发表于 2025-3-23 18:09:38

http://reply.papertrans.cn/47/4692/469167/469167_13.png

一起 发表于 2025-3-24 01:05:34

Tracing Attacks and Restoring Integrity with Lascarsely managed workstations typical of a research environment as found in CERN. The system tags events which have a potential to become harmful. On a given machine all processes that results from the tagged event are marked with the same tag and the tag is carried on to others machines if a tagged pro

Assault 发表于 2025-3-24 04:15:44

A Secure Multi-Sited Version Control Systemtes networked over the Internet. In this model of software development, multi-sited version control systems play a very important role to maintain the revision history of software and facilitate software evolution. In this paper we look into the security requirements of such multi-sited version cont

是他笨 发表于 2025-3-24 08:32:08

Integration of Integrity Constraints in Database Federationsn constructing database federations concerns maintaining quality and consistency of data on the global level of the federation. In particular, the integration of integrity constraints within component legacy databases into a single global schema is a process that is prone to incompleteness and incon

强制性 发表于 2025-3-24 13:33:00

Reducing Disruption in Time-Tabled Condition Monitoringime-tabled condition monitoring aims to overcome this disadvantage by allowing the system owners to specify the times at which condition monitoring may take place, and the times when the system is too busy with revenue generating (or otherwise mission critical) processing. Unfortunately, however, wh

意见一致 发表于 2025-3-24 16:01:20

A Service Oriented System Based Information Flow Model for Damage Assessment unavailability and is unacceptable in many time-critical applications. In this research we have developed a model to reduce this delay and aid in prompt assessment of damage, which is essential for faster recovery. In case of an attack notification, the goal of this model is to identify the affecte

证实 发表于 2025-3-24 22:50:18

An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraintsre accepts declarative global specification of constraints including user-defined p ]constraint, and an efficient representation that permits localized constraints checking. A new method called “Detection” is added to the structure to check the status of violation of the relations in an object-orien

明确 发表于 2025-3-24 23:28:24

From Security Culture to Effective E-Security Solutionsized to explain why security solutions are not effective. The global deployment of the information society is constrained by the development and overall acceptance of an international e-security framework. The validity of such model requires a challenging multidimensional approach of e-security. Sev
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Integrity and Internal Control in Information Systems VI; IFIP TC11 / WG11.5 S Sushil Jajodia,Leon Strous Book 2004 IFIP International Fede