International Conference on Trusted Systems最新文献

筛选
英文 中文
A Privacy-Aware Access Model on Anonymized Data 匿名数据的隐私感知访问模型
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_13
Xuezhen Huang, Jiqiang Liu, Zhen Han
{"title":"A Privacy-Aware Access Model on Anonymized Data","authors":"Xuezhen Huang, Jiqiang Liu, Zhen Han","doi":"10.1007/978-3-319-27998-5_13","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_13","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134608368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using TPM Secure Storage in Trusted High Availability Systems 在可信的高可用性系统中使用TPM安全存储
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_16
Martin Hell, Linus Karlsson, B. Smeets, Jelena Mirosavljevic
{"title":"Using TPM Secure Storage in Trusted High Availability Systems","authors":"Martin Hell, Linus Karlsson, B. Smeets, Jelena Mirosavljevic","doi":"10.1007/978-3-319-27998-5_16","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_16","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Traitor Tracing Based on Partially-Ordered Hierarchical Encryption 基于部分有序分层加密的叛逆者跟踪
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_18
Yan Zhu, Dandan Li, Liguang Yang
{"title":"Traitor Tracing Based on Partially-Ordered Hierarchical Encryption","authors":"Yan Zhu, Dandan Li, Liguang Yang","doi":"10.1007/978-3-319-27998-5_18","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_18","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132719926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set 结构分析与语言集相结合的软件行为模型度量方法
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_9
Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li
{"title":"Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set","authors":"Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li","doi":"10.1007/978-3-319-27998-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_9","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Characterization of Cybersecurity Posture from Network Telescope Data 基于网络望远镜数据的网络安全态势表征
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_7
Zhenxin Zhan, Maochao Xu, Shouhuai Xu
{"title":"A Characterization of Cybersecurity Posture from Network Telescope Data","authors":"Zhenxin Zhan, Maochao Xu, Shouhuai Xu","doi":"10.1007/978-3-319-27998-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_7","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs 基于访问控制空间、信息流和cpn的SELinux策略分析工具
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_19
Gaoshou Zhai, Tao Guo, Jie Huang
{"title":"SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs","authors":"Gaoshou Zhai, Tao Guo, Jie Huang","doi":"10.1007/978-3-319-27998-5_19","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_19","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124288267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Template Attacks Based on Priori Knowledge 基于先验知识的模板攻击
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_22
Guangjun Fan, Yongbin Zhou, Hailong Zhang, D. Feng
{"title":"Template Attacks Based on Priori Knowledge","authors":"Guangjun Fan, Yongbin Zhou, Hailong Zhang, D. Feng","doi":"10.1007/978-3-319-27998-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_22","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123851819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diversification of System Calls in Linux Binaries Linux二进制文件中系统调用的多样化
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_2
Sampsa Rauti, S. Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, S. Hyrynsalmi, V. Leppänen
{"title":"Diversification of System Calls in Linux Binaries","authors":"Sampsa Rauti, S. Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, S. Hyrynsalmi, V. Leppänen","doi":"10.1007/978-3-319-27998-5_2","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes DATAEvictor:减少针对多个内存副本和数据生命周期的敏感数据的泄漏
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_21
Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng
{"title":"DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes","authors":"Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng","doi":"10.1007/978-3-319-27998-5_21","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_21","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131321215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage 云存储用户撤销公共审计中的密钥暴露保护
International Conference on Trusted Systems Pub Date : 2014-12-16 DOI: 10.1007/978-3-319-27998-5_8
Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia
{"title":"Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage","authors":"Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia","doi":"10.1007/978-3-319-27998-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-27998-5_8","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信