perimenopause 发表于 2025-3-23 11:21:59

Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System,at can and do go wrong when deploying the system. Rather than trying to define security explicitly, this paper takes the position that one should consider the security of a system by comparing it against others whose security we consider to be acceptable: Alice is satisfied if her system is no less secure than Bob’s system.

uveitis 发表于 2025-3-23 15:05:39

http://reply.papertrans.cn/87/8635/863428/863428_12.png

是剥皮 发表于 2025-3-23 18:40:52

http://reply.papertrans.cn/87/8635/863428/863428_13.png

Pantry 发表于 2025-3-24 01:34:57

http://reply.papertrans.cn/87/8635/863428/863428_14.png

macular-edema 发表于 2025-3-24 06:09:12

http://reply.papertrans.cn/87/8635/863428/863428_15.png

暗语 发表于 2025-3-24 07:04:19

http://reply.papertrans.cn/87/8635/863428/863428_16.png

中国纪念碑 发表于 2025-3-24 14:22:28

http://reply.papertrans.cn/87/8635/863428/863428_17.png

吹牛者 发表于 2025-3-24 16:14:06

http://reply.papertrans.cn/87/8635/863428/863428_18.png

蚊子 发表于 2025-3-24 23:01:19

Conference proceedings 2017UK, in March 2017. ..The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions.  The theme of this year‘s workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of secur

背书 发表于 2025-3-24 23:47:26

Simulating Perceptions of Security,n on a model of the system is even more complicated than the original modelling problem we can’t solve. Ockham’s razor says to model the perceptions directly, since these will be simpler than the system itself.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Security Protocols XXV; 25th International W Frank Stajano,Jonathan Anderson,Vashek Matyáš Conference proceedings 2017 Springer Internation