找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Practice and Experience; First International Robert H. Deng,Feng Bao,Jianying Zhou Conference proceedings 2005 Spring

[复制链接]
楼主: choleric
发表于 2025-3-30 11:23:09 | 显示全部楼层
发表于 2025-3-30 15:53:12 | 显示全部楼层
Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applicationsality test on . is much more time-consuming than the random number generation and thus it occupies most of the running time of the prime generation. To reduce the running time of the primality test, real applications combine several primality test methods. The most widely used combination is the com
发表于 2025-3-30 17:33:34 | 显示全部楼层
发表于 2025-3-30 22:06:48 | 显示全部楼层
发表于 2025-3-31 03:17:03 | 显示全部楼层
发表于 2025-3-31 06:16:11 | 显示全部楼层
Security On-demand Architecture with Multiple Modules Supportieved by supporting diverse security modules, invoking them on demand. However, the security architectures of existing projects on Linux kernels do not support this feature or have some drawbacks in their supporting. Thus we introduce a layered architecture which consists of original kernel layer, m
发表于 2025-3-31 10:55:30 | 显示全部楼层
Measuring Resistance to Social Engineering wouldn’t have. Typically this includes making the victims disclose passwords, or give the adversary illegitimate access to buildings or privileged information. The book . by Kevin Mitnick gives several examples of potential attacks. Clearly, countermeasures are needed. Countermeasures may include s
发表于 2025-3-31 14:58:11 | 显示全部楼层
Conformance Checking of RBAC Policy and its Implementationicy and its implementation might be altered, and after introducing changes, it is not obvious that they are consistent. Therefore, we need to validate conformance between policy and its implementation. In this paper we describe an approach based on finite-model checking to verify that a RBAC impleme
发表于 2025-3-31 20:22:29 | 显示全部楼层
发表于 2025-3-31 22:53:55 | 显示全部楼层
A Task-Oriented Access Control Model for WfMS to users dynamically while business processes are being executed., We propose a Take-Oriented Access Control (TOAC) model based on RBAC to remedy this problem. In TOAC, permissions are associated with tasks as well as roles. Users can get permissions through tasks that they carry out in certain pro
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 11:23
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表