找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data and Applications Security and Privacy XXVIII; 28th Annual IFIP WG Vijay Atluri,Günther Pernul Conference proceedings 2014 IFIP Intern

[复制链接]
楼主: indulge
发表于 2025-3-28 16:24:55 | 显示全部楼层
Incremental Analysis of Evolving Administrative Role Based Access Control Policies,ns can result in policies by which a user can acquire permissions that may compromise some security goals. In particular, we are interested in sequences of safety problems generated by modifications (namely, adding/deleting an element to/from the set of possible actions) to an ARBAC policy accommoda
发表于 2025-3-28 22:37:05 | 显示全部楼层
Mining Attribute-Based Access Control Policies from Logs,ms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for mining ABAC policies from operation logs and attribute
发表于 2025-3-29 02:30:40 | 显示全部楼层
Attribute-Aware Relationship-Based Access Control for Online Social Networks,thorization policies are typically specified in terms of relationships of certain types and/or depth between the access requester and the target. However, using relationships alone is often not sufficient to enforce various security and privacy requirements that meet the expectation fromtoday’sOSN u
发表于 2025-3-29 06:12:50 | 显示全部楼层
Hunting the Unknown,, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain . a given query is anomalous, which further boosts the practical applicability of the system.
发表于 2025-3-29 08:18:58 | 显示全部楼层
https://doi.org/10.1007/978-3-030-29959-0osal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.
发表于 2025-3-29 13:01:53 | 显示全部楼层
发表于 2025-3-29 16:20:11 | 显示全部楼层
Robert Lyerly,Xiaoguang Wang,Binoy Ravindranhe ability to identify the data subjects of the leaked information. To specify and reason on data sensitivity in an application domain, we propose a data model representing the knowledge in the domain. We validate our approach by analyzing data leakages within a healthcare environment.
发表于 2025-3-29 22:25:41 | 显示全部楼层
发表于 2025-3-30 00:13:59 | 显示全部楼层
Computer Security – ESORICS 2020gnificant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.
发表于 2025-3-30 04:11:12 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 14:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表