標題: Titlebook: Secure Data Management; 5th VLDB Workshop, S Willem Jonker,Milan Petkovi? Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 200 [打印本頁] 作者: 鳥場 時間: 2025-3-21 17:57
書目名稱Secure Data Management影響因子(影響力)
書目名稱Secure Data Management影響因子(影響力)學科排名
書目名稱Secure Data Management網(wǎng)絡公開度
書目名稱Secure Data Management網(wǎng)絡公開度學科排名
書目名稱Secure Data Management被引頻次
書目名稱Secure Data Management被引頻次學科排名
書目名稱Secure Data Management年度引用
書目名稱Secure Data Management年度引用學科排名
書目名稱Secure Data Management讀者反饋
書目名稱Secure Data Management讀者反饋學科排名
作者: 聽覺 時間: 2025-3-21 22:53 作者: BRAWL 時間: 2025-3-22 01:06 作者: ROOF 時間: 2025-3-22 07:00
Secure Data Management978-3-540-85259-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 勉強 時間: 2025-3-22 11:11
A Methodology for Bridging between RBAC and an Arbitrary Application Programh an arbitrary application program. We highlight tradeoffs between the ANSI RBAC model and the Role Graph Model, and also enumerate different versions of each. We then discuss alternatives to bridging between an RBAC model and an ad hoc program. An example of the application of one of the alternatives is given.作者: hysterectomy 時間: 2025-3-22 16:02 作者: Rankle 時間: 2025-3-22 20:36
Simulatable Binding: Beyond Simulatable Auditingon flow from the database state to the auditing decision. Kenthapadi et al. [14] proposed the . model to solve this problem in a way that completely blocks the aforementioned information flow. However, the security does not come for free. The simulatable auditing model actually suffers from unnecess作者: 固執(zhí)點好 時間: 2025-3-23 00:43 作者: 星球的光亮度 時間: 2025-3-23 02:30 作者: 外科醫(yī)生 時間: 2025-3-23 09:27 作者: Atmosphere 時間: 2025-3-23 12:08 作者: 赤字 時間: 2025-3-23 14:14 作者: 易于交談 時間: 2025-3-23 19:40
A Trusted Approach to E-Commercee the purchaser is required to provide sensitive information to the commercial entity or because the purchaser may be suspicious that after payment has been processed, the goods purchased will not arrive. The challenge for the researcher is to determine the e-commerce model which maximizes the trust作者: 洞穴 時間: 2025-3-24 00:04
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Locatntext information can help an attacker to perform inference over obfuscated data and to refine the estimate of the sensitive data up to a violation of the original privacy requirements. We consider the problem in a location privacy protection set-up where the sensitive attribute to be protected is t作者: 莊嚴 時間: 2025-3-24 05:15 作者: Offbeat 時間: 2025-3-24 09:29 作者: 過于光澤 時間: 2025-3-24 12:59
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-identity-based proxy re-encryption scheme based on the Bon作者: 芳香一點 時間: 2025-3-24 15:17
A Methodology for Bridging between RBAC and an Arbitrary Application Programh an arbitrary application program. We highlight tradeoffs between the ANSI RBAC model and the Role Graph Model, and also enumerate different versions of each. We then discuss alternatives to bridging between an RBAC model and an ad hoc program. An example of the application of one of the alternativ作者: 樣式 時間: 2025-3-24 22:17
An Anonymity Model Achievable Via Microaggregationat .-anonymity alone does not always ensure privacy. A number of sophistications of .-anonymity have been proposed, like .-sensitive .-anonymity, .-diversity and .-closeness. We identify some shortcomings of those models and propose a new model called (.,.,.,.)-anonymity. Also, we propose a computat作者: Vulnerable 時間: 2025-3-25 00:52 作者: 男學院 時間: 2025-3-25 05:57 作者: Canyon 時間: 2025-3-25 07:45 作者: 抵制 時間: 2025-3-25 15:22
How Anonymous Is k-Anonymous? Look at Your Quasi-ID shown to be a necessary refinement. The concept of .-anonymity defined in a world without using QI is an interesting artifact itself, but more importantly, it provides a sound framework to gauge the use of QI for .-anonymization.作者: 并置 時間: 2025-3-25 18:25 作者: 拖網(wǎng) 時間: 2025-3-25 23:32 作者: 共同時代 時間: 2025-3-26 02:39 作者: thrombosis 時間: 2025-3-26 05:06
Query Rewriting for Access Control on Semantic Webn the Semantic Web. We propose to specify the security policies for access restrictions on resources as views declared based on ontologies. Illustrated examples are presented in the paper for explaining the underlying concepts. In addition, bucket-based algorithms are proposed for supporting the query rewriting.作者: epinephrine 時間: 2025-3-26 08:33
An Anonymity Model Achievable Via Microaggregationversity and .-closeness. We identify some shortcomings of those models and propose a new model called (.,.,.,.)-anonymity. Also, we propose a computational procedure to achieve this new model that relies on microaggregation.作者: NAVEN 時間: 2025-3-26 13:32 作者: 為現(xiàn)場 時間: 2025-3-26 20:43 作者: 反省 時間: 2025-3-26 23:36
A Trusted Approach to E-Commercehe instances which maximize trust for the purchaser. This leads us to propose four new models for e-commerce which would improve consumer trust and therefore likely lead to an increase in on-line commerce. We demonstrate that no new technologies are needed in order to implement these new models.作者: TAP 時間: 2025-3-27 01:36 作者: 范圍廣 時間: 2025-3-27 05:54 作者: 符合規(guī)定 時間: 2025-3-27 12:14
ics SISY 2011 held on September 8-10, 2011 in Subotica, Serb.The theory and applications of? intelligent systems is today an important field of research. This? book is an up-to-date collection of seventeen chapters, written by recognized experts in the field. In an introductory mathematical foundati作者: Aura231 時間: 2025-3-27 15:02 作者: Volatile-Oils 時間: 2025-3-27 21:49 作者: engagement 時間: 2025-3-27 23:55
Mohamed R. Fouad,Guy Lebanon,Elisa BertinoSafety, Reliability and Maintainability Issues" that was held in Kusadasi, Turkey during August 24- 28, 1992. Attendance at this workshop was mainly by invitation only, drawing people internationally representing industry, government and the academic community. Many of the participants were internat作者: 褻瀆 時間: 2025-3-28 05:36
Ashish Kamra,Elisa Bertino,Rimma NehmeSafety, Reliability and Maintainability Issues" that was held in Kusadasi, Turkey during August 24- 28, 1992. Attendance at this workshop was mainly by invitation only, drawing people internationally representing industry, government and the academic community. Many of the participants were internat作者: 按時間順序 時間: 2025-3-28 07:51 作者: FILTH 時間: 2025-3-28 14:17
Chenyun Dai,Dan Lin,Elisa Bertino,Murat Kantarcioglurized by basins of attraction generated by state transitions in control space (statespace + parameter space). State uncertainty is modelled as a cellular control space, namely the cell space. Learning performance losses are related to nonseparable basins of attractions with fuzzy boundaries and to t作者: 不如屎殼郎 時間: 2025-3-28 18:15
Philipp K?rger,Daniel Olmedilla,Wolf-Tilo Balkeliability and Maintainability Issues" that was held in Kusadasi, Turkey during August 24- 28, 1992. Attendance at this workshop was mainly by invitation only, drawing people internationally representing industry, government and the academic community. Many of the participants were internationally re作者: 使長胖 時間: 2025-3-28 21:01
Giannakis Antoniou,Lynn Batten,Udaya Parampalliction to accommodate its ever-growing needs for adaptation to modern industrial processes and standards. Their willingness to integrate Cyber-Physical Systems (CPS) modules in their manufacturing processes and to implement Cyber-Physical Production Systems (CPPS) is firmly based on the perception th作者: 摘要記錄 時間: 2025-3-29 02:54
Gabriele Gianini,Ernesto Damianiure. The DECOS architecture guides system engineers in the development of complex embedded real-time systems by providing a framework for integrating multiple application systems within a single distributed computer system. This integration is supported by a model-based development process which ena作者: 杠桿 時間: 2025-3-29 03:13
Jian Li,William K. Cheungrrently only few compilers available that support this standard. Therefore, we have implemented a stand-alone library according to the standard that can be compiled with standard C compilers. The library is available as open source and written in plain C, thus can be used in various target architect作者: 遭遇 時間: 2025-3-29 11:13
Mark Slaymaker,David Power,Douglas Russell,Andrew Simpsonure. The DECOS architecture guides system engineers in the development of complex embedded real-time systems by providing a framework for integrating multiple application systems within a single distributed computer system. This integration is supported by a model-based development process which ena作者: 思想 時間: 2025-3-29 14:13 作者: indemnify 時間: 2025-3-29 17:17 作者: 特征 時間: 2025-3-29 19:57 作者: Stress-Fracture 時間: 2025-3-30 00:05 作者: 不要不誠實 時間: 2025-3-30 06:31
sight, it can provide high rewards and increases in quality of product, services and decisions. Intelligence can be defined as an ability to acquire knowledge as well as having wisdom to apply knowledge and skills in the right way. It is also defined as an ability to respond quickly, flexibly and by作者: 火花 時間: 2025-3-30 08:11 作者: Herpetologist 時間: 2025-3-30 12:53
Lei Zhang,Sushil Jajodia,Alexander Brodsky complex dynamic systems. Two major conclusions evolved from the ARW are: 1. A continued need exists to develop formal, theoretical frameworks for the architecture of such systems, together with a reflection on the concept of intelligence. 2. There is a need to focus greater attention to the role th作者: 使人煩燥 時間: 2025-3-30 18:53
Vikram Goyal,S. K. Gupta,Manish Singh,Anand Guptag concept. We then evaluate predictability of these patterns based on Lyapunov exponents. Performance measures in training are generated based on box counting fractal dimensions and the lose of reliability is detected by bifurcation phenomena. Illustrative results are reported for a collision free i