找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 96; 4th European Symposi Elisa Bertino,Helmut Kurth,Emilio Montolivo Conference proceedings 1996 Springer-Verla

[復(fù)制鏈接]
21#
發(fā)表于 2025-3-25 03:42:03 | 只看該作者
The Possibility of Radical Reform?,agent systems. A unique aspect of the architecture is a “state appraisal” mechanism that protects users and hosts from attacks via state modifications and that provides users with flexible control over the authority of their agents.
22#
發(fā)表于 2025-3-25 08:13:30 | 只看該作者
23#
發(fā)表于 2025-3-25 14:32:40 | 只看該作者
24#
發(fā)表于 2025-3-25 16:04:08 | 只看該作者
Lightweight micro-cash for the internet,rotocols for cash withdrawal, payment and deposit. We reason that these features support a lightweight cash system suitable for handling very low value payment transactions, such as information purchases on the Internet.
25#
發(fā)表于 2025-3-25 20:49:50 | 只看該作者
Digital payment systems with passive anonymity-revoking trustees,but only in case of a justified suspicion. In this paper we propose the first efficient anonymous digital payment systems satisfying this requirement. The described basic protocol for anonymity revocation can be used in on-line or off-line payment systems.
26#
發(fā)表于 2025-3-26 02:10:06 | 只看該作者
Role hierarchies and constraints for lattice-based access controls,property) and no-write-up (strict *-property), can be easily accommodated in RBAC. Our results attest to the flexibility of RBAC and its ability to accommodate different policies by suitable configuration of role hierarchies and constraints.
27#
發(fā)表于 2025-3-26 04:42:44 | 只看該作者
An authorization model for federated systems,sk of specifying authorizations. A site can require to authenticate the user at each access or accept his identity as communicated by the federation. An access control algorithm describing controls to be enforced at the federation and at each local site under the different authentication and administrative options is presented.
28#
發(fā)表于 2025-3-26 11:43:02 | 只看該作者
29#
發(fā)表于 2025-3-26 15:45:44 | 只看該作者
Threat scenarios as a means to formally develop secure systems,specification. Security is defined as a particular relation on threat scenarios and systems. We show the usefulness of our approach by developing an authentic server component, thereby analysing two simple authentication protocols.
30#
發(fā)表于 2025-3-26 17:06:01 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 12:58
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
增城市| 武川县| 新竹县| 涪陵区| 潞城市| 绥滨县| 平乡县| 普安县| 甘泉县| 金坛市| 星子县| 长丰县| 浦江县| 松潘县| 新源县| 六枝特区| 海伦市| 建湖县| 平乡县| 古蔺县| 金阳县| 册亨县| 南木林县| 观塘区| 根河市| 当雄县| 天津市| 利川市| 长垣县| 龙门县| 镇原县| 新巴尔虎左旗| 都匀市| 安顺市| 盐津县| 禄劝| 伊金霍洛旗| 图木舒克市| 吴江市| 太仓市| 神木县|