派博傳思國(guó)際中心

標(biāo)題: Titlebook: Database Security XI; Status and Prospects T. Y. Lin,Shelly Qian Book 1998 IFIP International Federation for Information Processing 1998 Ac [打印本頁(yè)]

作者: 時(shí)間    時(shí)間: 2025-3-21 18:30
書(shū)目名稱(chēng)Database Security XI影響因子(影響力)




書(shū)目名稱(chēng)Database Security XI影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Database Security XI網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Database Security XI網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Database Security XI被引頻次




書(shū)目名稱(chēng)Database Security XI被引頻次學(xué)科排名




書(shū)目名稱(chēng)Database Security XI年度引用




書(shū)目名稱(chēng)Database Security XI年度引用學(xué)科排名




書(shū)目名稱(chēng)Database Security XI讀者反饋




書(shū)目名稱(chēng)Database Security XI讀者反饋學(xué)科排名





作者: 混沌    時(shí)間: 2025-3-21 22:17

作者: 被詛咒的人    時(shí)間: 2025-3-22 04:01
Women in the Political Backgroundis claim for B+trees by providing a detailed performance analysis for this index structure. We also give the algorithms for inserting and deleting key values, as well as for searching for a key value, in the proposed index structure.
作者: Observe    時(shí)間: 2025-3-22 06:28

作者: 商店街    時(shí)間: 2025-3-22 10:18

作者: Herbivorous    時(shí)間: 2025-3-22 14:32
A Two-tier Coarse Indexing Scheme for MLS Database Systemsis claim for B+trees by providing a detailed performance analysis for this index structure. We also give the algorithms for inserting and deleting key values, as well as for searching for a key value, in the proposed index structure.
作者: Herbivorous    時(shí)間: 2025-3-22 20:09

作者: 說(shuō)笑    時(shí)間: 2025-3-22 21:43

作者: Unsaturated-Fat    時(shí)間: 2025-3-23 02:21
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authnts during the completion of tasks in accordance with some application logic. By taking a task-oriented view of access control and authorizations, TBAC lays the foundation for research into a new breed of “active” security models that are required for agent-based distributed computing and workflow management.
作者: 發(fā)炎    時(shí)間: 2025-3-23 09:07

作者: 包裹    時(shí)間: 2025-3-23 13:45
Politikwissenschaftliche Paperbacksage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.
作者: 淺灘    時(shí)間: 2025-3-23 16:38

作者: ALLEY    時(shí)間: 2025-3-23 22:03
Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databasesage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.
作者: 就職    時(shí)間: 2025-3-23 23:13
https://doi.org/10.1057/9780333982785 through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsibilities in n-tiered architectures and in decoupled data management components, security-awareness of applications, and assurance.
作者: 消極詞匯    時(shí)間: 2025-3-24 04:17
https://doi.org/10.1007/978-3-663-09508-8model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Environment, providing a common foundation for access control in heterogeneous object models.
作者: 浮雕    時(shí)間: 2025-3-24 10:31

作者: 手銬    時(shí)間: 2025-3-24 11:58
Distributed object technologies, databases, and security and security. Data management can be implemented either through distributed object interfaces added to a conventional database system architecture or through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsi
作者: reserve    時(shí)間: 2025-3-24 15:04

作者: ciliary-body    時(shí)間: 2025-3-24 22:03
Web implementation of a security mediator for medical databasese some of their protected information, tools are being developed to facilitate the information transfer while protecting the privacy of the data. To this end, under the TIHI project, we have designed a . a software entity that screens both incoming queries and outgoing results for compliance with a
作者: 污穢    時(shí)間: 2025-3-25 01:34
Supporting the requirements for multi-level secure and real-time databases in distributed environmense to have partial security in order to improve on real-time performance when necessary. By our definition, systems that are partially secure allow security violations between only certain levels. We present the ideas behind a specification language that allows database designers to specify importan
作者: 頌揚(yáng)本人    時(shí)間: 2025-3-25 06:02
A principled approach to object deletion and garbage collection in multilevel secure object basesODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.
作者: Pde5-Inhibitors    時(shí)間: 2025-3-25 08:29
Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databasesd policies for Methods and Inheritance. However, discretionary authorization models do not provide the high assurance required in systems where Information flow is considered a problem. Mandatory models can solve the problem but usually they are too rigid for commercial applications. Therefore discr
作者: FLIT    時(shí)間: 2025-3-25 12:05
Capability-based primitives for access control in object-oriented systemsommon foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Envir
作者: PRE    時(shí)間: 2025-3-25 19:46
An execution model for multilevel secure workflowsctivities (or tasks) in a workflow, task dependencies are specified among them. In a multilevel secure (MLS) workflow, tasks may belong to different security levels. Ensuring the task dependencies from the tasks at higher security levels to those at lower security level (high-to-low dependencies) ma
作者: conservative    時(shí)間: 2025-3-25 21:50
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented auth access controls from a task-oriented perspective than the traditional subject-object one. Access mediation now involves authorizations at various points during the completion of tasks in accordance with some application logic. By taking a task-oriented view of access control and authorizations, TBA
作者: Cirrhosis    時(shí)間: 2025-3-26 03:12
Alter-egos and Roles — Supporting Workflow Security in Cyberspacefor security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by . security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these
作者: Affluence    時(shí)間: 2025-3-26 06:23
A Two-tier Coarse Indexing Scheme for MLS Database Systemse and reducing the storage required for indexing. At the bottom tier, our scheme requires separate single-level indices, one for each partition of the multilevel relation; at the top tier, our scheme requires a . multilevel index consisting of only those key values from the single-level indices that
作者: LAITY    時(shí)間: 2025-3-26 09:34

作者: 減去    時(shí)間: 2025-3-26 12:41
A principled approach to object deletion and garbage collection in multilevel secure object basesODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.
作者: 誘惑    時(shí)間: 2025-3-26 20:20
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/d/image/263384.jpg
作者: syring    時(shí)間: 2025-3-26 21:21

作者: obtuse    時(shí)間: 2025-3-27 03:49
https://doi.org/10.1057/9780230376120Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.
作者: 不可比擬    時(shí)間: 2025-3-27 07:59
Security issues in data warehousing and data mining: panel discussionThis paper describes the panel discussion on data warehousing, data mining and security.
作者: flavonoids    時(shí)間: 2025-3-27 11:15
Replication does survive information warfare attacksRecent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.
作者: 小卒    時(shí)間: 2025-3-27 13:52

作者: Ledger    時(shí)間: 2025-3-27 20:23

作者: 模仿    時(shí)間: 2025-3-28 01:25
Parliament and the Constitutione some of their protected information, tools are being developed to facilitate the information transfer while protecting the privacy of the data. To this end, under the TIHI project, we have designed a . a software entity that screens both incoming queries and outgoing results for compliance with a
作者: 細(xì)絲    時(shí)間: 2025-3-28 04:23

作者: 絕緣    時(shí)間: 2025-3-28 09:11

作者: Instrumental    時(shí)間: 2025-3-28 12:00
Politikwissenschaftliche Paperbacksd policies for Methods and Inheritance. However, discretionary authorization models do not provide the high assurance required in systems where Information flow is considered a problem. Mandatory models can solve the problem but usually they are too rigid for commercial applications. Therefore discr
作者: artless    時(shí)間: 2025-3-28 18:01
https://doi.org/10.1007/978-3-663-09508-8ommon foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Envir
作者: GULLY    時(shí)間: 2025-3-28 19:44
Daniel Lindmark,Erik J. Anderssonctivities (or tasks) in a workflow, task dependencies are specified among them. In a multilevel secure (MLS) workflow, tasks may belong to different security levels. Ensuring the task dependencies from the tasks at higher security levels to those at lower security level (high-to-low dependencies) ma
作者: 教義    時(shí)間: 2025-3-28 23:48

作者: 大罵    時(shí)間: 2025-3-29 06:07
Stefan Gelfgren,Daniel Lindmarkfor security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by . security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these
作者: 黑豹    時(shí)間: 2025-3-29 09:10
Women in the Political Backgrounde and reducing the storage required for indexing. At the bottom tier, our scheme requires separate single-level indices, one for each partition of the multilevel relation; at the top tier, our scheme requires a . multilevel index consisting of only those key values from the single-level indices that
作者: Brocas-Area    時(shí)間: 2025-3-29 14:36
https://doi.org/10.1007/978-3-031-51205-6n the form of a deadline and is represented by a priority to be used by schedulers. In many real-time applications, security is another important requirement, since the system maintains sensitive information to be shared by multiple users with different levels of security clearance. As more advanced
作者: 努力趕上    時(shí)間: 2025-3-29 18:16

作者: debble    時(shí)間: 2025-3-29 20:30
https://doi.org/10.1007/978-3-663-09508-8ODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.
作者: SLING    時(shí)間: 2025-3-30 02:45
Book 1998This book aims to discuss in depth the current state ofresearch and practice in database security. It documents progress andprovidesresearchers and students with a broad perspective of recentdevelopments in what is recognised as a key topic in business and inthe public sector.
作者: Evocative    時(shí)間: 2025-3-30 05:55

作者: 容易生皺紋    時(shí)間: 2025-3-30 10:01

作者: Extort    時(shí)間: 2025-3-30 13:50
Designing security agents for the DOK federated systems allow the coordination of different federated activities, (ii) task agents perform specific tasks of the federation, and finally (iii) database agents provide the required information for coordination and task agents.
作者: 整理    時(shí)間: 2025-3-30 17:13
An execution model for multilevel secure workflowsWe propose algorithms to automatically redesign the workflow and demonstrate that only a small subset among all the types of high-to-low dependencies requires to be executed by trusted subjects and all other types can be executed without compromising security.
作者: Absenteeism    時(shí)間: 2025-3-30 20:58

作者: Dendritic-Cells    時(shí)間: 2025-3-31 03:20

作者: 深淵    時(shí)間: 2025-3-31 07:52

作者: Fabric    時(shí)間: 2025-3-31 10:25

作者: FLAG    時(shí)間: 2025-3-31 16:09
,Das B?rsenbureau, Führung der zur ordnungsm??igen Erledigung dieser Gesch?fte notwendigen Bücher getrennt. Ein ?hnlicher Unterschied wurde auch beim Wechselbureau in Anwendung gebracht. Beim B?rsenbureau ergibt sich diese Trennung von selbst, weil die B?rsengesch?fte nicht in den R?umen der Bank, sondern an der B?rse abgeschlossen werden.




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
长宁区| 宣汉县| 扶绥县| 洛隆县| 罗山县| 泰顺县| 雅江县| 黔西县| 电白县| 深泽县| 太和县| 天津市| 牙克石市| 平顺县| 奈曼旗| 抚宁县| 泰来县| 阿克| 丹凤县| 黔东| 肇源县| 拉孜县| 嫩江县| 正宁县| 治县。| 贡山| 娄烦县| 金门县| 甘泉县| 五原县| 政和县| 玉树县| 瑞昌市| 莆田市| 木里| 常山县| 江孜县| 定西市| 共和县| 临城县| 文昌市|