找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Security - ESORICS 92; Second European Symp Yves Deswarte,Gérard Eizenberg,Jean-Jacques Quisqu Conference proceedings 1992 Springe

[复制链接]
查看: 16905|回复: 53
发表于 2025-3-21 18:54:48 | 显示全部楼层 |阅读模式
书目名称Computer Security - ESORICS 92
副标题Second European Symp
编辑Yves Deswarte,Gérard Eizenberg,Jean-Jacques Quisqu
视频videohttp://file.papertrans.cn/234/233876/233876.mp4
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Computer Security - ESORICS 92; Second European Symp Yves Deswarte,Gérard Eizenberg,Jean-Jacques Quisqu Conference proceedings 1992 Springe
描述This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l‘information et des syst mes) in cooperation with a large number of national and international societies and institutes. 
出版日期Conference proceedings 1992
关键词Communication Security; Computer Security; Computersicherheit; Data Integrity; Database; Datenbankensiche
版次1
doihttps://doi.org/10.1007/BFb0013888
isbn_softcover978-3-540-56246-7
isbn_ebook978-3-540-47488-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 1992
The information of publication is updating

书目名称Computer Security - ESORICS 92影响因子(影响力)




书目名称Computer Security - ESORICS 92影响因子(影响力)学科排名




书目名称Computer Security - ESORICS 92网络公开度




书目名称Computer Security - ESORICS 92网络公开度学科排名




书目名称Computer Security - ESORICS 92被引频次




书目名称Computer Security - ESORICS 92被引频次学科排名




书目名称Computer Security - ESORICS 92年度引用




书目名称Computer Security - ESORICS 92年度引用学科排名




书目名称Computer Security - ESORICS 92读者反馈




书目名称Computer Security - ESORICS 92读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:46:05 | 显示全部楼层
发表于 2025-3-22 03:18:51 | 显示全部楼层
发表于 2025-3-22 07:23:28 | 显示全部楼层
The Coming of the Mass Market, 1850–1914I environment are presented. We describe then a protocol for the exchange and evaluation of both . and CP, ., hence ensuring a secure propagation of trust and knowledge over the network. Finally, the Added value of the given scheme is discussed in relation to certificate‘s establishment and revocati
发表于 2025-3-22 11:02:47 | 显示全部楼层
发表于 2025-3-22 13:14:13 | 显示全部楼层
Type-level access controls for distributed structurally object-oriented database systems security context of a process the type-rights of this process. Our model has virtually no built-in, enforced policies; it allows users to realize a wide range of application-specific security policies. It supports multiple inheritance; in order to prevent inconsistent rights on types with common su
发表于 2025-3-22 18:31:48 | 显示全部楼层
Verification and modelling of authentication protocolsnstrumented as a verification tool which also allows for modelling the different protocol participants as finite state machines. Also, actions of intruders, consequences of such intrusions, and the respective counter-measures can be modelled and simulated.
发表于 2025-3-22 23:45:12 | 显示全部楼层
Associating metrics to certification pathsI environment are presented. We describe then a protocol for the exchange and evaluation of both . and CP, ., hence ensuring a secure propagation of trust and knowledge over the network. Finally, the Added value of the given scheme is discussed in relation to certificate‘s establishment and revocati
发表于 2025-3-23 04:32:59 | 显示全部楼层
An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributto a potential intruder. This technique can be applied to application objects and/or to the objects used in the implementation of the basic object-oriented system. The paper illustrates the technique using a detailed example, of an “electronic diary”, that has been designed using Eiffel, and experim
发表于 2025-3-23 09:24:00 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-25 18:22
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表