咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 电气工程
    • 2 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 2 篇 declassification
  • 1 篇 program analysis
  • 1 篇 π-calculus
  • 1 篇 noninterference
  • 1 篇 threat assessmen...
  • 1 篇 endorsement
  • 1 篇 mobile computing
  • 1 篇 security policy
  • 1 篇 pushdown system
  • 1 篇 information flow

机构

  • 1 篇 guangxi key lab ...
  • 1 篇 school of comput...
  • 1 篇 the national com...
  • 1 篇 the state key la...
  • 1 篇 school of electr...
  • 1 篇 cyberspace insti...

作者

  • 1 篇 chen zhong
  • 1 篇 sun cong
  • 1 篇 ma jianfeng
  • 1 篇 gao sheng
  • 1 篇 huang wenting
  • 1 篇 yin lihua
  • 1 篇 xi ning
  • 1 篇 fang binxing
  • 1 篇 zhang huibing
  • 1 篇 guo yunchuan

语言

  • 2 篇 英文
检索条件"主题词=declassification"
2 条 记 录,以下是1-10 订阅
排序:
Threat-Based declassification and Endorsement for Mobile Computing
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 1041-1052页
作者: YIN Lihua GUO Yunchuan ZHANG Huibing HUANG Wenting FANG Binxing Cyberspace Institute of Advanced Technology Guangzhou University The State Key Laboratory of Information Security Institute of Information Engineering CAS Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology The National Computer Network Emergency Response Technical Team/Coordination Center of China
declassification and endorsement can efficiently improve the usability of mobile ***, both declassify and endorse operations in practice are often ad-hoc and nondeterministic, thus, being insecure. From a new perspect... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Automated enforcement for relaxed information release with reference points
收藏 引用
Science China(Information Sciences) 2014年 第11期57卷 131-149页
作者: SUN Cong XI Ning GAO Sheng CHEN Zhong MA JianFeng School of Computer Science and Technology Xidian University School of Electronics Engineering and Computer Science Peking University
Language-based information flow security is a promising approach for enforcement of strong security and protection of the data confidentiality for the end-to-end communications. Here, noninterference is the standard a... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论