找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Research Directions in Data and Applications Security; IFIP TC11 / WG11.3 S Ehud Gudes,Sujeet Shenoi Book 2003 IFIP International Federatio

[復(fù)制鏈接]
查看: 48637|回復(fù): 57
樓主
發(fā)表于 2025-3-21 18:48:17 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Research Directions in Data and Applications Security
副標(biāo)題IFIP TC11 / WG11.3 S
編輯Ehud Gudes,Sujeet Shenoi
視頻videohttp://file.papertrans.cn/828/827750/827750.mp4
叢書名稱IFIP Advances in Information and Communication Technology
圖書封面Titlebook: Research Directions in Data and Applications Security; IFIP TC11 / WG11.3 S Ehud Gudes,Sujeet Shenoi Book 2003 IFIP International Federatio
描述.Research Directions in Data and Applications Security. describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: .-Role-Based Access Control; .-Database Security; .-XML Security; .-Data Mining and Inference; .-Multimedia System Security; .-Network Security; .-Public Key Infrastructure; .-Formal Methods and Protocols; .-Security and Privacy..
出版日期Book 2003
關(guān)鍵詞Access; Bridge; Extensible Markup Language (XML); access control; algorithms; communication; data mining; d
版次1
doihttps://doi.org/10.1007/978-0-387-35697-6
isbn_softcover978-1-4757-6413-0
isbn_ebook978-0-387-35697-6Series ISSN 1868-4238 Series E-ISSN 1868-422X
issn_series 1868-4238
copyrightIFIP International Federation for Information Processing 2003
The information of publication is updating

書目名稱Research Directions in Data and Applications Security影響因子(影響力)




書目名稱Research Directions in Data and Applications Security影響因子(影響力)學(xué)科排名




書目名稱Research Directions in Data and Applications Security網(wǎng)絡(luò)公開度




書目名稱Research Directions in Data and Applications Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Research Directions in Data and Applications Security被引頻次




書目名稱Research Directions in Data and Applications Security被引頻次學(xué)科排名




書目名稱Research Directions in Data and Applications Security年度引用




書目名稱Research Directions in Data and Applications Security年度引用學(xué)科排名




書目名稱Research Directions in Data and Applications Security讀者反饋




書目名稱Research Directions in Data and Applications Security讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:32:40 | 只看該作者
Using X.509 Attribute Certificates for Role-Based EAMtration are defined and a security architecture is discussed. We also demonstrate the feasibility of our approach through a proof-of-concept implementation. Several issues from our experiment are briefly discussed as well.
板凳
發(fā)表于 2025-3-22 00:34:50 | 只看該作者
Towards Secure XML Federationsecture, we address security issues of XML federations, especially the authentication and authorization of federation users. We point out several problems in applying existing access control schemes and give our solutions.
地板
發(fā)表于 2025-3-22 08:04:14 | 只看該作者
5#
發(fā)表于 2025-3-22 10:53:41 | 只看該作者
6#
發(fā)表于 2025-3-22 13:24:58 | 只看該作者
Privilege Administration for the Role Graph Modelph model, it is assumed that when privilege . is present in a role, all privileges that might be implied by . are also present in the role. This paper gives revised algorithms to ensure that this is done, using a model for implication of permissions originally developed for object-oriented databases
7#
發(fā)表于 2025-3-22 20:44:04 | 只看該作者
Role Delegation for a Resource-Based Security Modelimensions. One dimension is delegation, where an authorized individual may delegate all or part of his/her authority to another individual, increasing security risk. This paper explores the inclusion of role delegation into a unified security model/enforcement framework that controls access to softw
8#
發(fā)表于 2025-3-22 21:14:46 | 只看該作者
Using X.509 Attribute Certificates for Role-Based EAMntrol (RBAC) and X.509 attribute certificates for scalable and interoperable authorization. Compared with previous works in this area, we show that our approach can overcome the problems of previous solutions and broaden RBAC’s applicability into large-scale networks. The components for role adminis
9#
發(fā)表于 2025-3-23 05:20:16 | 只看該作者
Implementing Workflow Systems processes and the responsibilities of individuals within these processes with relative ease. It is further possible to implement complex constraints including security and access control with workflow systems. Separation-of-duty is a security constraint that recently started to find its way into th
10#
發(fā)表于 2025-3-23 07:23:02 | 只看該作者
Multiphase Damage Confinement System for Databasesaired. Traditional database damage confinement is ., that is, a damaged data item is confined only after it is identified as corrupted, and one- phase damage confinement has a serious problem, that is, during damage assessment serious damage spreading can be caused. In this paper, we present the des
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-21 17:19
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
吴江市| 酒泉市| 武冈市| 利津县| 肥城市| 灵璧县| 诸城市| 山丹县| 蒙山县| 民勤县| 苍山县| 巴彦淖尔市| 金山区| 永年县| 桑日县| 雷波县| 富阳市| 河源市| 洪泽县| 随州市| 西藏| 太湖县| 正安县| 九江市| 宣汉县| 五台县| 伊川县| 庆城县| 陇南市| 晋江市| 昆明市| 闻喜县| 滁州市| 天柱县| 屏东市| 大城县| 中山市| 平罗县| 青龙| 尼玛县| 鄂托克前旗|