Fillet,Filet 发表于 2025-3-25 06:04:39

Addressing Privacy and Trust Issues in Cultural Heritage Modellingarn from it. Recent developments in ICT have significantly boosted research and development activities aimed at the creation and management of cultural heritage resources. As a result, information systems play an increasingly important role on storing and managing cultural heritage information and a

cochlea 发表于 2025-3-25 09:47:02

An Ontology Regulating Privacy Oriented Access Controlsloud computing, the decision to grant access to a resource must ensure a secure management with a specific attention to privacy and data protection regulations. In recent years, many access control models and languages were proposed. Despite increasing legislative pressure, few of these propositions

milligram 发表于 2025-3-25 13:52:51

A Literature Survey and Classifications on Data Deanonymisationacks on publishing data. The related work available in the literature is inadequate in terms of the number of techniques analysed, and is limited to certain contexts such as Online Social Networks. We survey a large number of state-of-the-art techniques of deanonymisation achieved in various methods

maintenance 发表于 2025-3-25 16:09:28

Improving Users’ Trust Through Friendly Privacy Policies: An Empirical Study show that many users do not trust the websites with respect to the use of their private data. Similarly, they find it unfair that their data is used to generate revenue by online service without their knowledge or without their earning from this..In this paper, we take as main assumptions that the

apiary 发表于 2025-3-25 23:05:24

MPLS Policy Target Recognition Networkhe efficiency of their networks; particularly the MPLS protocol where traffic engineering is required for the guarantee of Quality of Service (QoS) that is crucial for real-time dependant systems such as financial services, government and public safety, critical infrastructures and smart grids. Netw

商品 发表于 2025-3-26 03:40:19

http://reply.papertrans.cn/84/8309/830810/830810_26.png

INCUR 发表于 2025-3-26 05:51:25

http://reply.papertrans.cn/84/8309/830810/830810_27.png

fluoroscopy 发表于 2025-3-26 08:37:57

http://reply.papertrans.cn/84/8309/830810/830810_28.png

多山 发表于 2025-3-26 13:39:09

Exploring a Controls-Based Assessment of Infrastructure Vulnerabilityquality of the information that flows through it. Currently, low-level infrastructure vulnerability is often judged in an ad hoc manner, based on the criteria and experience of the assessors. While methodological approaches to assessing an organisation’s vulnerability exist, they are often targeted

watertight, 发表于 2025-3-26 17:29:35

Quantifying Security in Web ETL Processesy is one of the non-functional requirements; it is recurrently ignored in the requirements phase. And within limited financial statement, security managers have to patch up the increasing number of WeBhouse vulnerabilities. It is possible to reduce software development cost and time to identify user
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Risks and Security of Internet and Systems; 10th International C Costas Lambrinoudakis,Alban Gabillon Conference proceedings 2016 Springer