找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data and Applications Security and Privacy XXVIII; 28th Annual IFIP WG Vijay Atluri,Günther Pernul Conference proceedings 2014 IFIP Intern

[复制链接]
楼主: indulge
发表于 2025-3-30 08:32:46 | 显示全部楼层
发表于 2025-3-30 15:58:40 | 显示全部楼层
Optimizing Integrity Checks for Join Queries in the Cloud,osal for assessing integrity of computations performed by potentially untrusted providers introducing some optimizations, thus limiting the overhead to be paid for integrity guarantees, and making it suitable to more scenarios.
发表于 2025-3-30 20:24:35 | 显示全部楼层
Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud,es queries on Kd-trees that are constructed from encrypted health records. It also prevents patients from inferring what health organizations are concerned about. We experimentally evaluate the performance of the proposed protocol and report on the results of implementation.
发表于 2025-3-31 00:41:59 | 显示全部楼层
发表于 2025-3-31 04:42:59 | 显示全部楼层
Toward Software Diversity in Heterogeneous Networked Systems,in more complex scenarios by taking into consideration practical constraints, e.g., hosts may have diverse requirements based on different system prerequisites. We evaluate the performance of our algorithm through simulations on both simple and complex system models. The results confirm the effectiveness and scalability of our algorithm.
发表于 2025-3-31 08:31:40 | 显示全部楼层
Design Patterns for Multiple Stakeholders in Social Computing,gnificant family of multiple-stakeholder scenarios. We discuss efficient implementation techniques that solely rely on standard SQL technology. We also identify scenarios in which general-purpose multiple-stakeholder schemes are necessary. We believe that future work on multiple stakeholders should focus on these scenarios.
发表于 2025-3-31 11:03:48 | 显示全部楼层
Incremental Analysis of Evolving Administrative Role Based Access Control Policies,ne on the previous problem in a sequence. An experimental evaluation shows the better performances of an implementation of our technique with respect to the only available approach to solve safety problems for evolving ARBAC policies proposed by Gofman, Luo, and Yang.
发表于 2025-3-31 14:30:09 | 显示全部楼层
Attribute-Aware Relationship-Based Access Control for Online Social Networks,hip-based access control (UURAC) model proposed in [6] is extended to enable such attribute-aware access control. We also present an enhanced path-checking algorithm to determine the existence of the required attributes and relationships in order to grant access.
发表于 2025-3-31 20:22:06 | 显示全部楼层
0302-9743 nd Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on access control, privacy, networked and mobile environments, data access, cl
发表于 2025-4-1 01:20:21 | 显示全部楼层
Hui Guo,Zhenfeng Zhang,Jing Xu,Mingyuan Xiae formalization of security and utility requirements and security mechanisms properties, we formally identify the best mechanisms, and the best way to combine them to get the best trade-off between utility and security.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 14:04
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表