找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security; 5th International Co Agnes Hui Chan,Virgil Gligor Conference proceedings 2002 Springer-Verlag Berlin Heidelberg 2002

[复制链接]
楼主: Stimulant
发表于 2025-3-30 10:48:21 | 显示全部楼层
发表于 2025-3-30 12:47:14 | 显示全部楼层
发表于 2025-3-30 20:12:21 | 显示全部楼层
Role-Based Access Control for E-commerce Sea-of-Data Applications systems one of the most feasible technologies to implement them. On the other hand mobile agent technologies are in a hot research state, spfiecially concerning security. We present an access control method for mobile agent systems. It is based on Role-based Access Control and trust management to p
发表于 2025-3-30 22:20:46 | 显示全部楼层
An Access Control Model for Tree Data Structures are literally as many access control schemes as there are tree data structures. Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to another kind of tree. In this paper, we propose an access control model for . tree data structures.
发表于 2025-3-31 02:23:26 | 显示全部楼层
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKIire additional use of authorization services in order for users to prove what they are allowed to do. Attribute certificates have changed the way in which the authorization problem has been considered until now, and Privilege Management Infrastructures (PMI) provide the necessary support for a wide
发表于 2025-3-31 06:20:55 | 显示全部楼层
发表于 2025-3-31 11:25:11 | 显示全部楼层
Quantifying Privacy Leakage through Answering Database Querieslected population in the database can be submitted to the data center. The answers to the queries leak private information of individuals though no identification information is provided. Inspired by decision theory, we present a quantitative model for the privacy protection problem in such a databa
发表于 2025-3-31 15:20:46 | 显示全部楼层
发表于 2025-3-31 20:21:06 | 显示全部楼层
Receipt-Free Sealed-Bid Auctionhe scheme enjoys receipt-freeness, secrecy of bidding price and public verifiability and uses a chameleon bit-commitment technique. It requires a bidding booth and a one-way untappable channel from eachbidding boothto eachauctioneer.
发表于 2025-4-1 01:20:44 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 15:22
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表