省略 发表于 2025-3-28 18:20:08

http://reply.papertrans.cn/89/8829/882824/882824_41.png

Endemic 发表于 2025-3-28 20:18:51

http://reply.papertrans.cn/89/8829/882824/882824_42.png

混杂人 发表于 2025-3-28 23:07:24

Michael R. Redcliftllows one to calculate the consequences to the data provider of widening privacy policies. We describe a quantitative analysis of violations that captures discrepancies between the data collector’s stated policies and practices in comparison to the data providers’ data preferences. We demonstrate th

无所不知 发表于 2025-3-29 04:01:46

http://reply.papertrans.cn/89/8829/882824/882824_44.png

绅士 发表于 2025-3-29 10:34:58

Ronald C. Bairdnsidered sensitive, either directly or because of the sensitive information it would allow the recipient to infer. Effective information sharing and dissemination can take place only if the data holder has some assurance that, while releasing information, disclosure of sensitive information is not a

马笼头 发表于 2025-3-29 12:21:24

Bonnie J. McCay,Thomas K. Rudel their outset. Attacks that succeed, to some degree at least, are unavoidable. With cyber attacks on data- intensive Internet applications, i.e., e-commerce systems, becoming an ever more serious threat to our economy, society, and everyday lives, attack resilient database systems that can survive m

gimmick 发表于 2025-3-29 16:41:16

http://reply.papertrans.cn/89/8829/882824/882824_47.png

让你明白 发表于 2025-3-29 22:55:34

Christopher Kennedyheir implementation, . compare different access control policies as well as different mechanisms that enforce the same policy, and . design mechanisms able to enforce multiple policies. This latter aspect is particularly important: if a mechanism is tied to a specific policy, a change in the policy

兴奋过度 发表于 2025-3-30 03:22:25

http://reply.papertrans.cn/89/8829/882824/882824_49.png

蛤肉 发表于 2025-3-30 07:56:40

Robin Leichenko their outset. Attacks that succeed, to some degree at least, are unavoidable. With cyber attacks on data- intensive Internet applications, i.e., e-commerce systems, becoming an ever more serious threat to our economy, society, and everyday lives, attack resilient database systems that can survive m
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Sustainability Science; The Emerging Paradig Michael P. Weinstein,R. Eugene Turner Book 2012 Springer Science+Business Media, LLC 2012