找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Network and System Security; 8th International Co Man Ho Au,Barbara Carminati,C.-C. Jay Kuo Conference proceedings 2014 Springer Internatio

[复制链接]
楼主: ONSET
发表于 2025-3-25 06:24:54 | 显示全部楼层
发表于 2025-3-25 08:23:27 | 显示全部楼层
Hierarchical Solution for Access Control and Authentication in Software Defined Networksrosed scheme gains not only scalability, but also flexibility and fine-gained access control. Based on this we then present an authentication protocol for this special architecture to enhance the ability of controllers in SDN for managing the users, devices and data flows flexibly.
发表于 2025-3-25 14:12:38 | 显示全部楼层
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computingcrypt the delegated data containing some keyword which matches the trapdoor from delegatee, (2) the proxy can only re-encrypt a limited number of delegated data to the delegatee; otherwise, the private key of the proxy will be exposed, and (3) the proxy cloud server learns nothing about the contents of data and keyword.
发表于 2025-3-25 15:51:17 | 显示全部楼层
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classificationnd its performance benefit from both theoretical and empirical perspectives. A large number of experiments were implemented on the real-world traffic dataset. The results show that the performance of “small classes” can be improved significantly even only with small number of training data and the performance of “large classes” remains stable.
发表于 2025-3-25 23:41:32 | 显示全部楼层
Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attackers are able to defeat the protocol by breaking the network connectivity. Concrete experiments are performed using a framework that implements both the protocol and the cheating model considered in this work.
发表于 2025-3-26 01:24:43 | 显示全部楼层
Adopting Provenance-Based Access Control in OpenStack Cloud IaaSt a cloud service architecture that provides PBAC authorization service and management. We discuss in depth the variations of PBAC authorization deployment architecture within the OpenStack platform and implement a proof-of-concept prototype. We analyze the initial experimental results and discuss approaches for potential improvements.
发表于 2025-3-26 05:15:04 | 显示全部楼层
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storagehe third party auditor (TPA) is able to verify the correctness of cloud data without the knowledge of mobile users’ identities during the data auditing process. We also analyze the security of the proposed protocol.
发表于 2025-3-26 11:15:27 | 显示全部楼层
发表于 2025-3-26 13:41:54 | 显示全部楼层
发表于 2025-3-26 17:21:43 | 显示全部楼层
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructurest an approach combining static and dynamic analyses, along with the analysis of discrepancies in the compared results. Our approach is sustained by experiments carried out on a VMware-based cloud platform.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-16 02:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表