果仁 发表于 2025-3-26 23:17:00

http://reply.papertrans.cn/87/8636/863544/863544_31.png

GRIPE 发表于 2025-3-27 01:12:56

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees,incorporates Attack-Defense trees (ADTrees) and Continuous Time Markov Chains (CTMCs) to systematically represent attacks, defenses, and their interaction. This solution allows to perform quantitative security assessment, with an aim to predict and/or identify attacks and find the best and appropriate defenses to reduce the impact of attacks.

canonical 发表于 2025-3-27 06:04:06

MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers,sources by implementing a unique denial-of-service attack and resource depletion attack. We also show that workers can be used to perform stealthy computation and create covert channels. We discuss potential mitigations and implement a preliminary solution to increase user awareness of worker execution.

accomplishment 发表于 2025-3-27 11:43:59

http://reply.papertrans.cn/87/8636/863544/863544_34.png

不可思议 发表于 2025-3-27 15:19:23

Towards a Personal Security Device,ommunication. Many European countries issue smart cards to provide eID and e-signature functionality on a high assurance level. However, to access these tokens, security-critical code has to be executed on the client platform of the user. If the client platform is compromised, an attacker may gain a

失望昨天 发表于 2025-3-27 18:19:25

http://reply.papertrans.cn/87/8636/863544/863544_36.png

sphincter 发表于 2025-3-28 01:02:27

http://reply.papertrans.cn/87/8636/863544/863544_37.png

我的巨大 发表于 2025-3-28 02:58:59

http://reply.papertrans.cn/87/8636/863544/863544_38.png

否决 发表于 2025-3-28 09:15:10

Enforcement of U-XACML History-Based Usage Control Policy,tributes of subjects and resources which change over time. Hence, the policy is continuously enforced while an action is performed on a resource, and it is re-evaluated at every context change. This permits to revoke the access to a resource as soon as the new context violates the policy. The Usage

Blood-Vessels 发表于 2025-3-28 12:13:59

Access Control for Weakly Consistent Replicated Information Systems,e data. In general, both data objects and access rules are subject to change over time, e.g., one might withdraw the right of a user to access a certain data object..In this paper, we present a new access control model for weakly consistent replicated information systems. Such systems are engineered
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Security and Trust Management; 12th International W Gilles Barthe,Evangelos Markatos,Pierangela Samara Conference proceedings 2016 Springer