果仁 发表于 2025-3-26 23:17:00
http://reply.papertrans.cn/87/8636/863544/863544_31.pngGRIPE 发表于 2025-3-27 01:12:56
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees,incorporates Attack-Defense trees (ADTrees) and Continuous Time Markov Chains (CTMCs) to systematically represent attacks, defenses, and their interaction. This solution allows to perform quantitative security assessment, with an aim to predict and/or identify attacks and find the best and appropriate defenses to reduce the impact of attacks.canonical 发表于 2025-3-27 06:04:06
MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers,sources by implementing a unique denial-of-service attack and resource depletion attack. We also show that workers can be used to perform stealthy computation and create covert channels. We discuss potential mitigations and implement a preliminary solution to increase user awareness of worker execution.accomplishment 发表于 2025-3-27 11:43:59
http://reply.papertrans.cn/87/8636/863544/863544_34.png不可思议 发表于 2025-3-27 15:19:23
Towards a Personal Security Device,ommunication. Many European countries issue smart cards to provide eID and e-signature functionality on a high assurance level. However, to access these tokens, security-critical code has to be executed on the client platform of the user. If the client platform is compromised, an attacker may gain a失望昨天 发表于 2025-3-27 18:19:25
http://reply.papertrans.cn/87/8636/863544/863544_36.pngsphincter 发表于 2025-3-28 01:02:27
http://reply.papertrans.cn/87/8636/863544/863544_37.png我的巨大 发表于 2025-3-28 02:58:59
http://reply.papertrans.cn/87/8636/863544/863544_38.png否决 发表于 2025-3-28 09:15:10
Enforcement of U-XACML History-Based Usage Control Policy,tributes of subjects and resources which change over time. Hence, the policy is continuously enforced while an action is performed on a resource, and it is re-evaluated at every context change. This permits to revoke the access to a resource as soon as the new context violates the policy. The UsageBlood-Vessels 发表于 2025-3-28 12:13:59
Access Control for Weakly Consistent Replicated Information Systems,e data. In general, both data objects and access rules are subject to change over time, e.g., one might withdraw the right of a user to access a certain data object..In this paper, we present a new access control model for weakly consistent replicated information systems. Such systems are engineered