Muffle 发表于 2025-3-25 05:33:46

Security Modelling for Risk Analysis,or security entities and relationships. The model database with associated software may then be employed to develop and display organisational threat networks representing the risk environment of the organisational information processing and communication system. Thereafter the design of the defence

别名 发表于 2025-3-25 11:11:51

http://reply.papertrans.cn/87/8636/863533/863533_22.png

Minikin 发表于 2025-3-25 14:18:15

http://reply.papertrans.cn/87/8636/863533/863533_23.png

Feature 发表于 2025-3-25 19:26:12

Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer T of many classes of vulnerabilities is pointer taintedness. A pointer is said to be tainted if a user input can directly or indirectly be used as a pointer value. In order to reason about pointer taintedness, a memory model is needed. The main contribution of this paper is the formal definition of a

nurture 发表于 2025-3-25 23:05:16

Meeting the Global Challenges of Security Incident Response,re threats not only to computing equipment but also to the stability of establishments, such as small to large governments or utilities serving large populations. New types of security-related incidents emerge frequently and massive activities take place across the globe to mitigate the violations o

eulogize 发表于 2025-3-26 02:41:51

http://reply.papertrans.cn/87/8636/863533/863533_26.png

carbohydrate 发表于 2025-3-26 06:23:23

http://reply.papertrans.cn/87/8636/863533/863533_27.png

萤火虫 发表于 2025-3-26 09:43:03

Interactive Access Control for Web Services,re provided by entities that see each other just as business partners. Web services require shift in the access control mechanism: from identity-based access control to trust management and negotiation, but this is not enough for cross organizational business processes. For many businesses no partne

FOLLY 发表于 2025-3-26 15:29:30

http://reply.papertrans.cn/87/8636/863533/863533_29.png

Basilar-Artery 发表于 2025-3-26 17:10:57

Modint: A Compact Modular Arithmetic Java Class Library for Cellular Phones, and its Application tong auctions and electronic voting. The library is small enough to port to a Java-enabled cellular phone. In this paper, we present a new electronic voting system using the Modlnt library, in which voters have their ballots encrypted with the public key of a trusted agent and cast them to an untruste
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Security and Protection in Information Processing Systems; IFIP 18th World Comp Yves Deswarte,Frédéric Cuppens,Lingyu Wang Conference proce