找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Risks and Security of Internet and Systems; 9th International Co Javier Lopez,Indrajit Ray,Bruno Crispo Conference proceedings 2015 Springe

[复制链接]
楼主: NK871
发表于 2025-3-30 10:45:35 | 显示全部楼层
Towards a Full Support of Obligations in XACML,tensible Access Control Markup Language) proposes a conceptual architecture and a policy language to reflect this ideal design of policy-based systems.However, while rights are well-captured by authorizations, duties, also called obligations, are not well managed by XACML architecture. The current v
发表于 2025-3-30 15:10:37 | 显示全部楼层
Managing Heterogeneous Access Control Models Cross-Organization,st suitable issue to secure this collaboration is using access control model. However access control model diversity makes it more complex to collaborate cross-organization, especially when each organization refuses to change its security policies, prefers to preserve its access control model and ne
发表于 2025-3-30 17:00:16 | 显示全部楼层
ISER: A Platform for Security Interoperability of Multi-source Systems, different participants to collaborate, exchange data and interact among them in order to achieve a global goal. However, some security issues such as the malicious use of resources, disclosure of data or bad services can appear during this collaboration..In this paper, a new platform is proposed th
发表于 2025-3-30 21:33:49 | 显示全部楼层
发表于 2025-3-31 03:39:25 | 显示全部楼层
发表于 2025-3-31 06:51:57 | 显示全部楼层
Regularity Based Decentralized Social Networks,ned by them; and the loss of control over the information contributed by their members. The attempts to create decentralized OSNs (DOSNs) enable each member of an OSN keeps its own data under its control, instead of surrendering it to a central place; providing its own access-control policy. However
发表于 2025-3-31 10:07:10 | 显示全部楼层
Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks,bination of anomaly, behavior and signature based techniques for detecting such zero-day attacks. The proposed approach detects obfuscated zero-day attacks with two-level evaluation, generates a new signature automatically and updates other sensors by using push technology via global hotfix feature.
发表于 2025-3-31 15:47:07 | 显示全部楼层
Towards a Full Support of Obligations in XACML,he history of obligations fulfillment/violation. In this work, we propose an extension of XACML reference model that integrates obligation states in the decision making process. We have extended XACML language and architecture for a better obligations support and have shown how obligations are managed in our proposed extended XACML architecture: .
发表于 2025-3-31 21:36:02 | 显示全部楼层
发表于 2025-4-1 01:25:18 | 显示全部楼层
ISER: A Platform for Security Interoperability of Multi-source Systems,order to (1) provide a secure virtualization of guests system, (2) create, model and manage systems secure interoperability, (3) verify the security policies and (4) monitor the system behavior. A case study is presented to illustrate the application of the platform.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-18 14:25
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表