找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Practice and Experience; First International Robert H. Deng,Feng Bao,Jianying Zhou Conference proceedings 2005 Spring

[复制链接]
楼主: choleric
发表于 2025-3-26 22:41:00 | 显示全部楼层
978-3-540-25584-0Springer-Verlag Berlin Heidelberg 2005
发表于 2025-3-27 02:48:04 | 显示全部楼层
Information Security Practice and Experience978-3-540-31979-5Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-27 06:15:20 | 显示全部楼层
发表于 2025-3-27 11:55:49 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465325.jpg
发表于 2025-3-27 17:05:49 | 显示全部楼层
Risk Assessment of Production Networks Using Honeynets – Some Practical Experiencecks. To support this assessment, honeynets, i.e. artificial networks set up specifically to monitor, log and evaluate attack activities, have been proposed. In this paper, experiences and results gained with setting up, deploying and operating such a honeynet are reported together with some comments on the effectiveness of this approach.
发表于 2025-3-27 17:49:10 | 显示全部楼层
Conformance Checking of RBAC Policy and its Implementationntation conforms to a security policy. We make use of the model-checking system SPIN, and show how to express RBAC policy constraints by means of LTL and how to model an RBAC implementation in SPIN’s internal modeling language PROMELA.
发表于 2025-3-28 01:37:43 | 显示全部楼层
A Task-Oriented Access Control Model for WfMScesses. And when they are out of processes, permissions can be granted by the roles that they are associated with. Moreover, to facilitate delegation in WfMS, we present a task delegation model which is aim at TOAC.
发表于 2025-3-28 05:36:08 | 显示全部楼层
Security On-demand Architecture with Multiple Modules Supportntation in Linux based system, SECIMOS is described. The caching issue and performance are also discussed. Our practice showed the architecture helps us achieve flexible adaptation in different environments.
发表于 2025-3-28 07:47:41 | 显示全部楼层
发表于 2025-3-28 12:37:59 | 显示全部楼层
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection understanding of the operating environments is the essential stage in the process of establishing an effective anomaly detection model, which therefore worth insightful exploration, especially when we face the dilemma between the detection performance and the computational cost.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 10:23
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表