Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Usage control enforcement-a survey
ÅA Nyre - … Conference on Availability, Reliability, and Security, 2011 - Springer
Sharing information allows businesses to take advantage of hidden knowledge, improve
work processes and cooperation both within and across organisations. Thus there is a need …
work processes and cooperation both within and across organisations. Thus there is a need …
Design and implementation of an efficient framework for behaviour attestation using n-call slides
We present design and implementation of behaviour based attestation of an enterprise
centric application. Remote attestation is used to measure the trustworthiness of the target …
centric application. Remote attestation is used to measure the trustworthiness of the target …
Remote attestation of attribute updates and information flows in a ucon system
UCON is a highly flexible and expressive usage control model which allows an object owner
to specify detailed usage control policies to be evaluated on a remote platform. Assurance of …
to specify detailed usage control policies to be evaluated on a remote platform. Assurance of …
Improving the trustworthiness of service QoS information in service-based systems
SS Yau, J Huang, Y Yin - … : 7th International Conference, ATC 2010, **'an …, 2010 - Springer
Abstract Service-oriented architecture facilitates rapid development and management of
large-scale distributed service-based systems (SBS), where new workflows are composed of …
large-scale distributed service-based systems (SBS), where new workflows are composed of …
Network traffic analysis with query driven visualization sc 2005 hpc analytics results
Our analytics task is to identify, characterize, and visualize anomalous subsets of as large of
a collection of network connection data as possible. We use a combination of HPC …
a collection of network connection data as possible. We use a combination of HPC …
Behavioral attestation for business processes
Service oriented architecture (SOA) is an architectural paradigm that enables dynamic
composition of heterogeneous, independent, multi-vendor business services. A prerequisite …
composition of heterogeneous, independent, multi-vendor business services. A prerequisite …
Specification and standardization of a java trusted computing api
SUMMARY The paradigm of Trusted Computing promises a new approach to improve the
security of computer systems. The core functionality, based on a hardware component …
security of computer systems. The core functionality, based on a hardware component …
Trustable outsourcing of business processes to cloud computing environments
S Alsouri, S Katzenbeisser… - 2011 5th international …, 2011 - ieeexplore.ieee.org
Cloud Computing, the next generation of Internet-based services, will allow cost-effective
outsourcing of applications and business processes. However, outsourcing business …
outsourcing of applications and business processes. However, outsourcing business …
Design and implementation of an attestation protocol for measured dynamic behavior
Security of applications running on remote devices has become an essential need of
enterprises. For this purpose, several software-based solutions have been proposed …
enterprises. For this purpose, several software-based solutions have been proposed …
White list security management mechanism based on trusted computing technology
B Zhao, H Zhang, H Guo, Y Qi - 2015 International Symposium …, 2015 - atlantis-press.com
A security management mechanism with white list is proposed based on trusted computing
technology. The mechanism runs dynamic measurements to verify their integrity when the …
technology. The mechanism runs dynamic measurements to verify their integrity when the …