Rejuvenate 发表于 2025-3-26 21:11:03

Implementing Real-Time Update of Access Control Policiesy-critical applications. In this paper, we consider real-time update of access control policies that arise in a database system. Updating policy while they are in-effect can lead to potential security problems. In an earlier work, we presented an algorithm that not only prevents such security proble

incision 发表于 2025-3-27 04:30:17

Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databasesation information is embedded into a database such that proof of ownership can be established by detecting the information in pirated data. However, most watermarking systems are vulnerable to the severe threat of additive attacks and this threat has not been studied formally. In an additive attack,

calamity 发表于 2025-3-27 08:45:32

http://reply.papertrans.cn/83/8278/827751/827751_33.png

表被动 发表于 2025-3-27 09:34:52

http://reply.papertrans.cn/83/8278/827751/827751_34.png

戏服 发表于 2025-3-27 15:01:19

Information Flow Analysis for File Systems and Databases Using Labelss extends traditional multilevel security models by allowing users to declassify information in a distributed way. We extend this decentralized labels model developed by other authors by addressing specific issues that arise in accessing files and databases and in general in I/O operations. While re

提名的名单 发表于 2025-3-27 20:08:07

http://reply.papertrans.cn/83/8278/827751/827751_36.png

Muffle 发表于 2025-3-27 22:42:01

http://reply.papertrans.cn/83/8278/827751/827751_37.png

烧烤 发表于 2025-3-28 05:04:53

Invited Talk - Towards Semantics-Aware Access Controlontrol models and languages. This paper outlines how context metadata can be referred to in semantics-aware access control policies and discusses the main open issues in designing, producing, and maintaining metadata for security.

Vulnerable 发表于 2025-3-28 09:10:04

http://reply.papertrans.cn/83/8278/827751/827751_39.png

Benzodiazepines 发表于 2025-3-28 13:37:22

Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephonese conversation. But, because public telephones do not encrypt voice, such teleconferences are vulnerable to eavesdropping. As a remedy, we offer secure bridges consisting of architectures and algorithms for eavesdropping resistant teleconferencing as a service over public switched telephone network
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Research Directions in Data and Applications Security XVIII; IFIP TC11 / WG11.3 E Csilla Farkas,Pierangela Samarati Conference proceedings