作者: 確定 時間: 2025-3-21 23:43
0302-9743 aly, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA ‘96..The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems作者: Flatus 時間: 2025-3-22 01:24 作者: 紡織品 時間: 2025-3-22 05:56 作者: 未完成 時間: 2025-3-22 10:20 作者: Obsequious 時間: 2025-3-22 14:04 作者: Obsequious 時間: 2025-3-22 20:19
A multilevel security model for distributed object systems,n of the model for object-oriented systems. In this last section, we first explain the principles of our security policy, then we describe the rules of our authorization scheme and we give an example of a typical scenario in a distributed object-oriented system.作者: 非秘密 時間: 2025-3-22 21:32
Sleepy network-layer authentication service for IPSEC, for every packet. In this paper, we examine a sleepy approach, where the gateways normally do not authenticate or verify the packets unless security attacks are detected. We propose a security protocol, ., residing on top of the .. One important feature of SSGP is the collaboration model between network and application layer security mechanisms.作者: GROG 時間: 2025-3-23 03:06
CSP and anonymity,nonymity within the CSP notation, discusses the approach taken by CSP to anonymity with respect to different viewpoints, and illustrates this approach on some toy examples, and then applies it to a machine-assisted analysis of the dining cryptographers example and some variants.作者: 建筑師 時間: 2025-3-23 07:09
Formal semantics for authentication logics,practice. The underlying logic is a K45-logic, including negation. We replace the critical idealization step by changing the set of premises. The formal semantics enables us to detect flaws in previous logics. We apply the logic to a new authentication protocol designed for UMTS.作者: insert 時間: 2025-3-23 11:40 作者: 中世紀(jì) 時間: 2025-3-23 15:02 作者: irreducible 時間: 2025-3-23 21:10 作者: 下邊深陷 時間: 2025-3-24 01:55 作者: Gingivitis 時間: 2025-3-24 03:43
https://doi.org/10.1007/978-94-007-7272-4the sensitive information. In this study we enhance our previous solutions to guard the sensitive information against two kinds of multi-query attacks: join attacks, and complement attacks. We then argue that the enhanced algorithm renders the sensitive information immune to attacks.作者: Ceremony 時間: 2025-3-24 08:23
Enhancing the controlled disclosure of sensitive information,the sensitive information. In this study we enhance our previous solutions to guard the sensitive information against two kinds of multi-query attacks: join attacks, and complement attacks. We then argue that the enhanced algorithm renders the sensitive information immune to attacks.作者: 土產(chǎn) 時間: 2025-3-24 12:41
The Context of European Agriculture,rotocols for cash withdrawal, payment and deposit. We reason that these features support a lightweight cash system suitable for handling very low value payment transactions, such as information purchases on the Internet.作者: SUE 時間: 2025-3-24 16:42
The Possibility of Radical Reform?,but only in case of a justified suspicion. In this paper we propose the first efficient anonymous digital payment systems satisfying this requirement. The described basic protocol for anonymity revocation can be used in on-line or off-line payment systems.作者: 招致 時間: 2025-3-24 20:58
The Context of European Agriculture,property) and no-write-up (strict *-property), can be easily accommodated in RBAC. Our results attest to the flexibility of RBAC and its ability to accommodate different policies by suitable configuration of role hierarchies and constraints.作者: 雪崩 時間: 2025-3-25 02:31
https://doi.org/10.1007/978-1-349-25731-7sk of specifying authorizations. A site can require to authenticate the user at each access or accept his identity as communicated by the federation. An access control algorithm describing controls to be enforced at the federation and at each local site under the different authentication and administrative options is presented.作者: 螢火蟲 時間: 2025-3-25 03:42
The Possibility of Radical Reform?,agent systems. A unique aspect of the architecture is a “state appraisal” mechanism that protects users and hosts from attacks via state modifications and that provides users with flexible control over the authority of their agents.作者: 粗魯?shù)娜?nbsp; 時間: 2025-3-25 08:13 作者: 大炮 時間: 2025-3-25 14:32 作者: Cumbersome 時間: 2025-3-25 16:04
Lightweight micro-cash for the internet,rotocols for cash withdrawal, payment and deposit. We reason that these features support a lightweight cash system suitable for handling very low value payment transactions, such as information purchases on the Internet.作者: Magnitude 時間: 2025-3-25 20:49
Digital payment systems with passive anonymity-revoking trustees,but only in case of a justified suspicion. In this paper we propose the first efficient anonymous digital payment systems satisfying this requirement. The described basic protocol for anonymity revocation can be used in on-line or off-line payment systems.作者: 存心 時間: 2025-3-26 02:10
Role hierarchies and constraints for lattice-based access controls,property) and no-write-up (strict *-property), can be easily accommodated in RBAC. Our results attest to the flexibility of RBAC and its ability to accommodate different policies by suitable configuration of role hierarchies and constraints.作者: irradicable 時間: 2025-3-26 04:42
An authorization model for federated systems,sk of specifying authorizations. A site can require to authenticate the user at each access or accept his identity as communicated by the federation. An access control algorithm describing controls to be enforced at the federation and at each local site under the different authentication and administrative options is presented.作者: 撕裂皮肉 時間: 2025-3-26 11:43 作者: enflame 時間: 2025-3-26 15:45
Threat scenarios as a means to formally develop secure systems,specification. Security is defined as a particular relation on threat scenarios and systems. We show the usefulness of our approach by developing an authentic server component, thereby analysing two simple authentication protocols.作者: 種類 時間: 2025-3-26 17:06 作者: 虛假 時間: 2025-3-27 00:15
Development of a Secure Electronic Marketplace for Europe,oject to develop the fundamentals of secure electronic commerce. The goal of Project . (Secure Electronic Marketplace for Europe) is to provide the first open and comprehensive solutions for secure commerce over the Internet and other public information networks. We describe the objectives and summa作者: ARY 時間: 2025-3-27 02:45
Lightweight micro-cash for the internet,ey. In addition to usual cash properties such as off-line bank for payment and spender‘s anonymity, the technique also provides a number of useful features. These include: identifying double spender with strong proof, cash revocable for identified double spender, independent of using tamper-resistan作者: STING 時間: 2025-3-27 05:52
Digital payment systems with passive anonymity-revoking trustees,nymity could be in conflict with law enforcement, for instance in cases of blackmailing or money laundering, it has been proposed to design systems in which a trustee or a set of trustees can selectively revoke the anonymity of the participants involved in suspicious transactions. From an operationa作者: 容易生皺紋 時間: 2025-3-27 12:06 作者: 內(nèi)閣 時間: 2025-3-27 15:13 作者: 畢業(yè)典禮 時間: 2025-3-27 21:01
A multilevel security model for distributed object systems,w some of its limits. Then we present some possible extensions of this model, with their drawbacks and advantages. We finally present our own extension of the model for object-oriented systems. In this last section, we first explain the principles of our security policy, then we describe the rules o作者: 平躺 時間: 2025-3-27 22:08 作者: 兒童 時間: 2025-3-28 03:25 作者: Mettle 時間: 2025-3-28 09:07
Server-Supported Signatures,gnatures, S.. It is based on . and .. One of its highlights is that for ordinary users the use of asymmetric cryptography is limited to signature .. S. is efficient in terms of computational, communication and storage costs. It also offers a degree of security comparable to existing techniques based作者: 仔細(xì)檢查 時間: 2025-3-28 10:47 作者: Cpap155 時間: 2025-3-28 16:40 作者: GIST 時間: 2025-3-28 22:21
Distributed proctoring,The mutual anonymity of the test takers and graders is ensured using anonymous MIXs, but an audit trail is provided in the event of a grading dispute. We discuss other applications for this protocol, more generally defined as “digital piecework.”作者: 吹氣 時間: 2025-3-28 22:59
Merging heterogeneous security orderings,hat all the databases comprising a mediated/federated system share the same security ordering. This assumption is often not true as the databases may have been developed independently by different agencies at different points in time. In this paper, we present techniques by which we may merge multip作者: 散布 時間: 2025-3-29 05:37 作者: 手銬 時間: 2025-3-29 08:25
Formal semantics for authentication logics,ic by a possible-worlds semantics. The logic was designed for implementation in the tool AUTLOG and is able to handle most kinds of protocols used in practice. The underlying logic is a K45-logic, including negation. We replace the critical idealization step by changing the set of premises. The form作者: 有角 時間: 2025-3-29 13:30 作者: concert 時間: 2025-3-29 18:54
The impact of multilevel security on database buffer management,secure page replacement, and reader/writer synchronization. We present a client/buffer manager interface with a set of synchronization guarantees that does not delay low writers in the presence of concurrent high readers, an allocation scheme that partitions slots by security level but allows buffer作者: Gossamer 時間: 2025-3-29 21:08 作者: 葡萄糖 時間: 2025-3-30 02:58 作者: 誹謗 時間: 2025-3-30 08:03 作者: 吊胃口 時間: 2025-3-30 12:04
The Possibility of Radical Reform?,gnatures, S.. It is based on . and .. One of its highlights is that for ordinary users the use of asymmetric cryptography is limited to signature .. S. is efficient in terms of computational, communication and storage costs. It also offers a degree of security comparable to existing techniques based on asymmetric cryptography.作者: Slit-Lamp 時間: 2025-3-30 13:51 作者: Diaphragm 時間: 2025-3-30 19:03
Martha Rendón-Anaya,Alfredo Herrera-EstrellaThe mutual anonymity of the test takers and graders is ensured using anonymous MIXs, but an audit trail is provided in the event of a grading dispute. We discuss other applications for this protocol, more generally defined as “digital piecework.”作者: Hyaluronic-Acid 時間: 2025-3-31 00:16
https://doi.org/10.1007/978-1-4684-6738-3oject to develop the fundamentals of secure electronic commerce. The goal of Project . (Secure Electronic Marketplace for Europe) is to provide the first open and comprehensive solutions for secure commerce over the Internet and other public information networks. We describe the objectives and summa作者: Water-Brash 時間: 2025-3-31 04:13 作者: 羅盤 時間: 2025-3-31 06:50
The Possibility of Radical Reform?,nymity could be in conflict with law enforcement, for instance in cases of blackmailing or money laundering, it has been proposed to design systems in which a trustee or a set of trustees can selectively revoke the anonymity of the participants involved in suspicious transactions. From an operationa作者: 網(wǎng)絡(luò)添麻煩 時間: 2025-3-31 10:21 作者: 言外之意 時間: 2025-3-31 16:46
The Context of European Agriculture,ated with roles, and users are made members of appropriate roles thereby acquiring the roles‘ permissions. In this paper we formally show that lattice-based mandatory access controls can be enforced by appropriate configuration of RBAC components. Our constructions demonstrate that role hierarchies 作者: Hirsutism 時間: 2025-3-31 21:00
The Context of European Agriculture,w some of its limits. Then we present some possible extensions of this model, with their drawbacks and advantages. We finally present our own extension of the model for object-oriented systems. In this last section, we first explain the principles of our security policy, then we describe the rules o作者: Lamina 時間: 2025-4-1 01:27 作者: investigate 時間: 2025-4-1 05:52 作者: flaggy 時間: 2025-4-1 08:28 作者: Jocose 時間: 2025-4-1 12:22 作者: 窩轉(zhuǎn)脊椎動物 時間: 2025-4-1 16:28
The Context of European Agriculture,tion information for every packet it forwards. This implies that, even there is no bad guy in the network, the authentication check is still performed for every packet. In this paper, we examine a sleepy approach, where the gateways normally do not authenticate or verify the packets unless security 作者: 糾纏,纏繞 時間: 2025-4-1 22:20 作者: Infiltrate 時間: 2025-4-2 00:13