MEAN 发表于 2025-3-25 07:20:51

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/863544.jpg

嘴唇可修剪 发表于 2025-3-25 10:27:33

https://doi.org/10.1007/978-3-319-46598-2access control; applied computing; authentication; data protection; Internet

progestin 发表于 2025-3-25 14:15:13

Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems,s from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy, move, and destroy information) and propose an algorithm that enforces a policy on the model, before checking against an adversary if a security requirement holds.

defuse 发表于 2025-3-25 16:56:11

Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection,entation of web applications and databases, and show that our formalization effectively exploits SQLi attacks. We implemented our approach in a prototype tool called SQLfast and we show its efficiency on four real-world case studies, including the discovery of an attack on Joomla! that no other tool can find.

RAFF 发表于 2025-3-25 22:16:50

Gilles Barthe,Evangelos Markatos,Pierangela SamaraIncludes supplementary material:

judiciousness 发表于 2025-3-26 01:25:11

Towards a Personal Security Device,nature tasks. We developed a concrete implementation on a RaspberryPI and evaluated the solution via an external application. Our solution increases the security of eID and e-signature processes by mitigating the impact of a compromised client platform.

adduction 发表于 2025-3-26 08:03:23

http://reply.papertrans.cn/87/8636/863544/863544_27.png

depreciate 发表于 2025-3-26 08:45:19

http://reply.papertrans.cn/87/8636/863544/863544_28.png

责问 发表于 2025-3-26 12:39:04

http://reply.papertrans.cn/87/8636/863544/863544_29.png

cliche 发表于 2025-3-26 18:31:55

Access Control Enforcement for Selective Disclosure of Linked Data,ntrol policies. Our results are grounded on previously established formal results proposed in [.]. We present an implementation of our ideas and we show that our solution for selective disclosure scales, is independent of the user query language, and incurs reasonable overhead at runtime.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Security and Trust Management; 12th International W Gilles Barthe,Evangelos Markatos,Pierangela Samara Conference proceedings 2016 Springer