找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 96; 4th European Symposi Elisa Bertino,Helmut Kurth,Emilio Montolivo Conference proceedings 1996 Springer-Verla

[復(fù)制鏈接]
21#
發(fā)表于 2025-3-25 03:42:03 | 只看該作者
The Possibility of Radical Reform?,agent systems. A unique aspect of the architecture is a “state appraisal” mechanism that protects users and hosts from attacks via state modifications and that provides users with flexible control over the authority of their agents.
22#
發(fā)表于 2025-3-25 08:13:30 | 只看該作者
23#
發(fā)表于 2025-3-25 14:32:40 | 只看該作者
24#
發(fā)表于 2025-3-25 16:04:08 | 只看該作者
Lightweight micro-cash for the internet,rotocols for cash withdrawal, payment and deposit. We reason that these features support a lightweight cash system suitable for handling very low value payment transactions, such as information purchases on the Internet.
25#
發(fā)表于 2025-3-25 20:49:50 | 只看該作者
Digital payment systems with passive anonymity-revoking trustees,but only in case of a justified suspicion. In this paper we propose the first efficient anonymous digital payment systems satisfying this requirement. The described basic protocol for anonymity revocation can be used in on-line or off-line payment systems.
26#
發(fā)表于 2025-3-26 02:10:06 | 只看該作者
Role hierarchies and constraints for lattice-based access controls,property) and no-write-up (strict *-property), can be easily accommodated in RBAC. Our results attest to the flexibility of RBAC and its ability to accommodate different policies by suitable configuration of role hierarchies and constraints.
27#
發(fā)表于 2025-3-26 04:42:44 | 只看該作者
An authorization model for federated systems,sk of specifying authorizations. A site can require to authenticate the user at each access or accept his identity as communicated by the federation. An access control algorithm describing controls to be enforced at the federation and at each local site under the different authentication and administrative options is presented.
28#
發(fā)表于 2025-3-26 11:43:02 | 只看該作者
29#
發(fā)表于 2025-3-26 15:45:44 | 只看該作者
Threat scenarios as a means to formally develop secure systems,specification. Security is defined as a particular relation on threat scenarios and systems. We show the usefulness of our approach by developing an authentic server component, thereby analysing two simple authentication protocols.
30#
發(fā)表于 2025-3-26 17:06:01 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 12:58
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
朔州市| 铅山县| 阿瓦提县| 益阳市| 宿州市| 塔城市| 北宁市| 集贤县| 闸北区| 炎陵县| 上栗县| 永年县| 特克斯县| 苏尼特左旗| 通化市| 佳木斯市| 乐安县| 平泉县| 如皋市| 磐石市| 玉屏| 师宗县| 门源| 南部县| 开化县| 江华| 宁城县| 临漳县| 临武县| 铜川市| 宾阳县| 土默特右旗| 甘泉县| 繁昌县| 南丹县| 武冈市| 彰化市| 大冶市| 临猗县| 梧州市| 武川县|