找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Research Directions in Data and Applications Security XVIII; IFIP TC11 / WG11.3 E Csilla Farkas,Pierangela Samarati Conference proceedings

[复制链接]
楼主: monster
发表于 2025-3-26 21:11:03 | 显示全部楼层
Implementing Real-Time Update of Access Control Policiesy-critical applications. In this paper, we consider real-time update of access control policies that arise in a database system. Updating policy while they are in-effect can lead to potential security problems. In an earlier work, we presented an algorithm that not only prevents such security proble
发表于 2025-3-27 04:30:17 | 显示全部楼层
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databasesation information is embedded into a database such that proof of ownership can be established by detecting the information in pirated data. However, most watermarking systems are vulnerable to the severe threat of additive attacks and this threat has not been studied formally. In an additive attack,
发表于 2025-3-27 08:45:32 | 显示全部楼层
发表于 2025-3-27 09:34:52 | 显示全部楼层
发表于 2025-3-27 15:01:19 | 显示全部楼层
Information Flow Analysis for File Systems and Databases Using Labelss extends traditional multilevel security models by allowing users to declassify information in a distributed way. We extend this decentralized labels model developed by other authors by addressing specific issues that arise in accessing files and databases and in general in I/O operations. While re
发表于 2025-3-27 20:08:07 | 显示全部楼层
发表于 2025-3-27 22:42:01 | 显示全部楼层
发表于 2025-3-28 05:04:53 | 显示全部楼层
Invited Talk - Towards Semantics-Aware Access Controlontrol models and languages. This paper outlines how context metadata can be referred to in semantics-aware access control policies and discusses the main open issues in designing, producing, and maintaining metadata for security.
发表于 2025-3-28 09:10:04 | 显示全部楼层
发表于 2025-3-28 13:37:22 | 显示全部楼层
Secure Bridges: A Means to Conduct Secure Teleconferences Over Public Telephonese conversation. But, because public telephones do not encrypt voice, such teleconferences are vulnerable to eavesdropping. As a remedy, we offer secure bridges consisting of architectures and algorithms for eavesdropping resistant teleconferencing as a service over public switched telephone network
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-9 16:49
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表