出血 发表于 2025-4-1 02:36:15

http://reply.papertrans.cn/83/8278/827752/827752_61.png

有特色 发表于 2025-4-1 06:29:04

An Evolution of Views, Study on Multilevel Data Management Security, to be held at Woods Hole. At the time, I was on the faculty at Purdue University, where I had spent the past several years working on the statistical database problem (protecting sensitive data released in the form of aggregate statistics). I had just f

Indicative 发表于 2025-4-1 11:18:33

http://reply.papertrans.cn/83/8278/827752/827752_63.png

闪光东本 发表于 2025-4-1 16:58:37

Report on the Homework Problem,e questions focused on the security requirements of an example database application. While the example itself is not particularly realistic, it exhibits a fairly typical database design and a set of security requirements that are characteristic of commercial and DoD applications. Its primary advanta

Juvenile 发表于 2025-4-1 19:24:11

Classifying and Downgrading: Is a Human Needed in the Loop?,e data semantics level, the contents of the product. The paper further asserts that for certain classes of data, “the system” can effectively determine the classification of the output product such that no human is required in the loop. For other classes of data, the paper asserts that we can not ex

Ingratiate 发表于 2025-4-1 23:44:53

http://reply.papertrans.cn/83/8278/827752/827752_66.png

Collar 发表于 2025-4-2 03:23:06

Dynamic Classification and Automatic Sanitization,nsion of topics discussed during the panel session on Dynamic Classification and Automatic Sanitization, and is reproduced from personal notes and a tape-recorded transcript. The panel was conducted in association with a panel on the closely allied topic of Aggregation and Inference. Earlier discuss
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Research Directions in Database Security; Teresa F. Lunt (Program Manager Secure Systems) Book 1992 Springer-Verlag New York, Inc. 1992 Ac