商品 发表于 2025-3-28 15:51:08

Privacy-Aware Trust Negotiation,from the early phases of the Software Development Life Cycle (SDLC). This paper follows this line and concentrates on the incorporation of trust negotiations during the requirements engineering phase. More precisely, we provide an extension to the SI* modelling language, which is further formalised

案发地点 发表于 2025-3-28 22:49:38

Securely Derived Identity Credentials on Smart Phones via Self-enrolment,plies in particular to passports, following the ICAO standard, but increasingly also to other identification documents, such as driver’s licenses. Such electronic identity (eID) documents can now be used as “mother cards” by the users to remotely enrol and obtain derived credentials which can in tur

superfluous 发表于 2025-3-29 02:51:25

Distributed Immutabilization of Secure Logs,, called immutable logs, that we deploy in our electronic voting solutions. This technology ensures the integrity, authenticity and non-repudiation of the generated logs, thus in case of any event the auditors can use them to investigate the issue. As a security recommendation it is advisable to sto

事与愿违 发表于 2025-3-29 05:13:17

http://reply.papertrans.cn/87/8636/863544/863544_44.png

翻动 发表于 2025-3-29 09:30:24

Information Security as Strategic (In)effectivity,can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary’s ab

高射炮 发表于 2025-3-29 12:45:14

http://reply.papertrans.cn/87/8636/863544/863544_46.png

发表于 2025-3-29 15:48:38

http://reply.papertrans.cn/87/8636/863544/863544_47.png

容易懂得 发表于 2025-3-29 21:31:17

http://reply.papertrans.cn/87/8636/863544/863544_48.png

Benzodiazepines 发表于 2025-3-30 00:24:43

http://reply.papertrans.cn/87/8636/863544/863544_49.png

AXIOM 发表于 2025-3-30 05:37:10

Privacy-Aware Trust Negotiation,iations during the requirements engineering phase. More precisely, we provide an extension to the SI* modelling language, which is further formalised using Answer Set Programming specifications to support the automatic verification of the model and the detection of privacy conflicts caused by trust negotiations.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Security and Trust Management; 12th International W Gilles Barthe,Evangelos Markatos,Pierangela Samara Conference proceedings 2016 Springer