標(biāo)題: Titlebook: Information Systems Security; 15th International C Deepak Garg,N. V. Narendra Kumar,Rudrapatna K. Shy Conference proceedings 2019 Springer [打印本頁] 作者: Monsoon 時(shí)間: 2025-3-21 19:17
書目名稱Information Systems Security影響因子(影響力)
書目名稱Information Systems Security影響因子(影響力)學(xué)科排名
書目名稱Information Systems Security網(wǎng)絡(luò)公開度
書目名稱Information Systems Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Systems Security被引頻次
書目名稱Information Systems Security被引頻次學(xué)科排名
書目名稱Information Systems Security年度引用
書目名稱Information Systems Security年度引用學(xué)科排名
書目名稱Information Systems Security讀者反饋
書目名稱Information Systems Security讀者反饋學(xué)科排名
作者: 鴕鳥 時(shí)間: 2025-3-21 21:04
Policy Reconciliation and Migration in Attribute Based Access Controle policy similarity. We also propose two different approaches for accomplishing policy reconciliation where one is based on ABAC mining and the other is based on finding maximal common subsets. Both of the approaches guarantee that the organization’s policies are never violated as they are both cons作者: 帶來墨水 時(shí)間: 2025-3-22 00:39 作者: 不可比擬 時(shí)間: 2025-3-22 08:25 作者: macrophage 時(shí)間: 2025-3-22 10:48 作者: 色情 時(shí)間: 2025-3-22 14:15
Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keysthe confidentiality of the key and data once a curious person finds a lost device or a thief steals it..In this paper, we propose and implement a cloud-based data sharing system that supports recovery after key-loss while binding the keys to the devices’ hardware. By using multi-use proxy re-encrypt作者: nepotism 時(shí)間: 2025-3-22 20:52
Deepak Garg,N. V. Narendra Kumar,Rudrapatna K. Shy作者: 使糾纏 時(shí)間: 2025-3-22 22:30 作者: 殺人 時(shí)間: 2025-3-23 04:16
are located or even to humanity as a whole. Construed in a static way, cultural heritage, which constitutes a given group or community, may be used in order to exclude those who do not belong to the same group or community. Under a dynamic concept, which recognizes the inspiring potential of cultur作者: Allure 時(shí)間: 2025-3-23 09:05 作者: HATCH 時(shí)間: 2025-3-23 12:57 作者: DEAWL 時(shí)間: 2025-3-23 17:40
bases his argumentation on constitutive elements of democratic societies that he has the willingness to help build: pluralism, integration and participation of all to collective affairs. Thus, he adopts a flexible positioning that adapts to the concrete needs of European societies that are both div作者: 天空 時(shí)間: 2025-3-23 18:05 作者: opinionated 時(shí)間: 2025-3-24 01:23
Saptarshi Das,Shamik Sural,Jaideep Vaidya,Vijayalakshmi Atluri,Gerhard Rigollnario. Now more than ever cultural heritage should perform a fundamental role and should be put at the center of recovery strategies catching up all its essential values for communities, nations, regions and inhabitants and exploiting all its potentialities for local reconstruction and development.作者: progestin 時(shí)間: 2025-3-24 04:12
Gunjan Batra,Vijayalakshmi Atluri,Jaideep Vaidya,Shamik Suralnario. Now more than ever cultural heritage should perform a fundamental role and should be put at the center of recovery strategies catching up all its essential values for communities, nations, regions and inhabitants and exploiting all its potentialities for local reconstruction and development.作者: 熱心 時(shí)間: 2025-3-24 08:39 作者: ciliary-body 時(shí)間: 2025-3-24 13:55 作者: BURSA 時(shí)間: 2025-3-24 17:22
e a basis from which to explore, second, the process of how this individual value system imposed upon Khmer cultural heritage and gradually formed the ideological basis for two colonial institutions. These institutions became the core of the “Khmer arts renovation programme” and were led by George G作者: 小母馬 時(shí)間: 2025-3-24 22:03 作者: 稱贊 時(shí)間: 2025-3-25 00:37 作者: endure 時(shí)間: 2025-3-25 05:51
Habsburg crown lands) existed side-by-side. Three sections—Habsburg post-colonial, inner colonization, and encyclopaedic projects to map ethnic and cultural heritage—examine the very specific circumstances of a multicultural empire that existed without colonies and questions the extent to which it i作者: 漸強(qiáng) 時(shí)間: 2025-3-25 10:26
Felix H?randner,Sebastian Ramacher,Simon Rothol people’s presence and activities in the site, which has necessitated the restriction of some “traditional” local practices. Many of the restrictions were imposed on the inhabitants for the sake of tourism development and the maintaining of the assumed ideal conditions of a World Heritage Site; th作者: expansive 時(shí)間: 2025-3-25 12:40
Felix H?randner,Franco Nieddue a basis from which to explore, second, the process of how this individual value system imposed upon Khmer cultural heritage and gradually formed the ideological basis for two colonial institutions. These institutions became the core of the “Khmer arts renovation programme” and were led by George G作者: fixed-joint 時(shí)間: 2025-3-25 18:43
Pranav Verma,Anish Mathuria,Sourish Dasguptad in the Western Han dynasty tombs at Mancheng, Hebei Province, are treated in the publications and analyses how this group of texts was orchestrated to lend ideological legitimacy to the exhibition and publications, thereby securing the recovery of archaeological work. They also laid the ideologica作者: 男生戴手銬 時(shí)間: 2025-3-25 21:05
Deepak Kumar Dalai,Santu Palons that are now offered for sale as NFTs or only available as online files without a tangible?carrier. The fragmentation of national cultural heritage legislation in Poland is presented via the example of the Act on Fryderyk Chopin’s cultural heritage.作者: 鳥籠 時(shí)間: 2025-3-26 02:23
978-3-030-36944-6Springer Nature Switzerland AG 2019作者: initiate 時(shí)間: 2025-3-26 07:00 作者: ARCH 時(shí)間: 2025-3-26 09:32 作者: 潰爛 時(shí)間: 2025-3-26 15:35
Wip: Degree Evaluation of Grain-v1is higher than the degree of the output function. Here, we have applied the technique on Grain-v1 to evaluate degree NFSR update bit and output bit during key scheduling phase of reduced round. We are trying to improve this technique and correctness for the full paper.作者: lymphedema 時(shí)間: 2025-3-26 17:11
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465529.jpg作者: BIAS 時(shí)間: 2025-3-26 23:04 作者: 狂熱語言 時(shí)間: 2025-3-27 02:28 作者: Ingest 時(shí)間: 2025-3-27 09:19
Conference proceedings 2019 and selected from 63 submissions..The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography..作者: Substance-Abuse 時(shí)間: 2025-3-27 10:03 作者: Aggrandize 時(shí)間: 2025-3-27 16:26
Conference proceedings 2019December 2019..The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions..The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed 作者: 真實(shí)的人 時(shí)間: 2025-3-27 19:01
Trustworthy Isolation of DMA Enabled Devicesions and that ensures that all memory accesses address allowed memory regions only. We demonstrate our approach by extending an existing Virtual Machine Introspection (VMI) with the monitor. The resulting platform prevents code injection in a connected and untrusted Linux (The HOL4 proofs and the source code of the monitor are published at ..).作者: Hectic 時(shí)間: 2025-3-27 22:50
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirementsfer from the offline user problem. Unlike previous works, our proposal does not require any additional third party. We demonstrate with the help of experiments that the time required to generate recommendations is efficient for practical applications.作者: REIGN 時(shí)間: 2025-3-28 03:44
A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programshain, (ii) use distinct pseudonyms to hide his or her real identity, (iii) choose what accuracy sensing data has, and (iv) verify whether his or her sensing data allows him or her to remain indistinguishable from other drivers whose data has been already disclosed in the blockchain.作者: Pander 時(shí)間: 2025-3-28 07:01
VisMAP: Visual Mining of Attribute-Based Access Control Policiesum. The problem is shown to be NP-Complete and hence, heuristic solution is proposed. We experimentally evaluate our proposed approach on a number of synthetically generated data sets to study its robustness and scalability in a variety of situations.作者: BOLUS 時(shí)間: 2025-3-28 14:17
Secure Information Flow Analysis Using the PRISM Model Checkerled PRISM-Leak, which is constructed on the PRISM model checker. An anonymity protocol, the dining cryptographers, is discussed as a case study to show how PRISM-Leak can be used to evaluate the security of programs. The scalability of the tool is demonstrated by comparing it to the state-of-the-art information flow tools.作者: 空中 時(shí)間: 2025-3-28 14:49 作者: modifier 時(shí)間: 2025-3-28 19:17
WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applicationse used for both good and bad. In this paper, we show how smart contracts can be used to build criminal applications. Here we construct an application that allows contractors to get the stolen private key of a target user from perpetrators in an end to end encrypted message application.作者: 鼓掌 時(shí)間: 2025-3-29 02:30
Trustworthy Isolation of DMA Enabled Devicessitive memory regions. As a demonstrating platform, we use the Network Interface Controller (NIC) of an embedded system. We develop a run-time monitor that forces NIC reconfigurations, defined by untrusted software, to satisfy a security rule. We formalized the NIC in the HOL4 interactive theorem pr作者: maroon 時(shí)間: 2025-3-29 05:02
Toward Implementing Spatio-Temporal RBAC Extensionsks by the users are available through the roles assigned to them. In order to effectively deploy and sustain RBAC in an organization, a set of roles needs to be designed. This can be done using an approach known as role mining. In many cases, it may be essential to limit the accessibility of the rol作者: 皺痕 時(shí)間: 2025-3-29 08:20 作者: 哄騙 時(shí)間: 2025-3-29 12:14
Policy Reconciliation and Migration in Attribute Based Access Control, management, analytics, etc. In this scenario, organizations want to ensure that their own security requirements are always met, even though they may be sharing/moving their resources to another organization. Hence, there is a need to evaluate the extent to which their policies are similar (or equi作者: Generator 時(shí)間: 2025-3-29 16:12
WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detectionlt in many fraudulent transactions. Owing to the spurt in the number of reported fraudulent transactions, customers and credit card service providers incur significant financial and reputation losses respectively. Therefore, building a powerful fraud detection system is paramount. It is noteworthy t作者: 溫和女孩 時(shí)間: 2025-3-29 20:05
An Introduction to the CellTree Paradigm (Invited Paper)es the concept in greater detail?[.]..A CellTree allows data to be stored in largely independent, and highly programmable ., which are . into a tree structure. The data in the cells are allowed to change over time, subject to each cell’s own policies; a cell’s policies also govern how the policies t作者: synovial-joint 時(shí)間: 2025-3-30 02:21 作者: 不能和解 時(shí)間: 2025-3-30 07:07 作者: Magnificent 時(shí)間: 2025-3-30 12:08
Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keyss of one user due to their convenience. Various end-to-end encryption mechanisms can be applied to protect the confidentiality of sensitive data in a not fully trusted cloud environment. As all such encryption mechanisms require to store keys on the client’s device, losing a device (and key) might l作者: 消音器 時(shí)間: 2025-3-30 13:48
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirementsver to generate recommendations from homomorphically encrypted ratings, thereby ensuring privacy of rating data. After collecting the encrypted ratings, the server may require further interaction with each user, which is problematic in case some users were to go offline. To solve the offline user pr作者: 離開就切除 時(shí)間: 2025-3-30 18:16 作者: HUSH 時(shí)間: 2025-3-30 20:44
16 February 2016. While congratulatory articles on and high expectations of the “Blue Helmets for Culture” (BHC) initiative, which was how the ITF came to be known, spread like wildfire, the task force remains nonoperative 18?months later. While the operational guideline negotiations are still under作者: 小溪 時(shí)間: 2025-3-31 01:30