Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
ASPGen: an automatic security policy generating framework for apparmor
Y Li, C Huang, L Yuan, Y Ding… - 2020 IEEE Intl Conf on …, 2020 - ieeexplore.ieee.org
The security of the operating system has always been the basis of information systems.
Several security frameworks have been proposed to enhance the security of the operating …
Several security frameworks have been proposed to enhance the security of the operating …
Using ifttt to express and enforce ucon obligations
Abstract If This Then That (IFTTT) is a free and widely used web-based platform where it is
possible to create applet chains (Applets) of simple conditional statements that combine …
possible to create applet chains (Applets) of simple conditional statements that combine …
A model-based approach for multi-level privacy policies derivation for cloud services
A Ghorbel, M Ghorbel, M Jmaiel - International Journal of …, 2021 - inderscienceonline.com
To benefit from the advantages offered by the cloud services, a data owner must move his
private data to external servers to be accessed and handled by unknown parties. This brings …
private data to external servers to be accessed and handled by unknown parties. This brings …
On the Accuracy Evaluation of Access Control Policies in a Social Network
J Yanez-Sierra, A Diaz-Perez… - 2020 International …, 2020 - ieeexplore.ieee.org
Access control policies are mandatory for organizations whose operation involves sharing
resources that must be kept private. In this paper, we address the problem of evaluating the …
resources that must be kept private. In this paper, we address the problem of evaluating the …
Exploiting if this then that and usage control obligations for smart home security and management
In this article we present an application of the Usage Control paradigm to a Smart Home
infrastructure, based on a model extension and structured use of obligations. In the …
infrastructure, based on a model extension and structured use of obligations. In the …
基于大语言模型的 AppArmor 安全策略自动生成方法
沙倚天, 刘少君, 钱欣, 吴越, 陈鹏… - 网络与信息安全 …, 2024 - infocomm-journal.com
在计算机信息系统的整体安全性中, 操作系统安全扮演着至关重要的角色,
而操作系统安全的基石是信息系统的安全. 目前, 已经有SELinux, AppArmor …
而操作系统安全的基石是信息系统的安全. 目前, 已经有SELinux, AppArmor …
Usage Control in the Internet of Everything
A Rizos - 2020 - tesidottorato.depositolegale.it
The Internet of Things (IoT) is a world-wide network of heterogeneous interconnected
objects, uniquely addressable, which are based on standard communication protocols and …
objects, uniquely addressable, which are based on standard communication protocols and …