用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Trust Management; 12th International W Gilles Barthe,Evangelos Markatos,Pierangela Samara Conference proceedings 2016 Springer

[复制链接]
楼主: deliberate
发表于 2025-3-26 23:17:00 | 显示全部楼层
发表于 2025-3-27 01:12:56 | 显示全部楼层
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees,incorporates Attack-Defense trees (ADTrees) and Continuous Time Markov Chains (CTMCs) to systematically represent attacks, defenses, and their interaction. This solution allows to perform quantitative security assessment, with an aim to predict and/or identify attacks and find the best and appropriate defenses to reduce the impact of attacks.
发表于 2025-3-27 06:04:06 | 显示全部楼层
MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers,sources by implementing a unique denial-of-service attack and resource depletion attack. We also show that workers can be used to perform stealthy computation and create covert channels. We discuss potential mitigations and implement a preliminary solution to increase user awareness of worker execution.
发表于 2025-3-27 11:43:59 | 显示全部楼层
发表于 2025-3-27 15:19:23 | 显示全部楼层
Towards a Personal Security Device,ommunication. Many European countries issue smart cards to provide eID and e-signature functionality on a high assurance level. However, to access these tokens, security-critical code has to be executed on the client platform of the user. If the client platform is compromised, an attacker may gain a
发表于 2025-3-27 18:19:25 | 显示全部楼层
发表于 2025-3-28 01:02:27 | 显示全部楼层
发表于 2025-3-28 02:58:59 | 显示全部楼层
发表于 2025-3-28 09:15:10 | 显示全部楼层
Enforcement of U-XACML History-Based Usage Control Policy,tributes of subjects and resources which change over time. Hence, the policy is continuously enforced while an action is performed on a resource, and it is re-evaluated at every context change. This permits to revoke the access to a resource as soon as the new context violates the policy. The Usage
发表于 2025-3-28 12:13:59 | 显示全部楼层
Access Control for Weakly Consistent Replicated Information Systems,e data. In general, both data objects and access rules are subject to change over time, e.g., one might withdraw the right of a user to access a certain data object..In this paper, we present a new access control model for weakly consistent replicated information systems. Such systems are engineered
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-2 02:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表