Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data usage control for distributed systems
F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …
used after they have been released and accessed. We address distributed aspects of this …
How current android malware seeks to evade automated code analysis
First we report on a new threat campaign, underway in Korea, which infected around 20,000
Android users within two months. The campaign attacked mobile users with malicious …
Android users within two months. The campaign attacked mobile users with malicious …
Davast: Data-centric system level activity visualization
Host-based intrusion detection systems need to be complemented by analysis tools that
help understand if malware or attackers have indeed intruded, what they have done, and …
help understand if malware or attackers have indeed intruded, what they have done, and …
Decentralized distributed data usage control
F Kelbert, A Pretschner - … Conference on Cryptology and Network Security, 2014 - Springer
Data usage control provides mechanisms for data owners to remain in control over how their
data is used after it is has been shared. Many data usage policies can only be enforced on a …
data is used after it is has been shared. Many data usage policies can only be enforced on a …
[BOK][B] Privacy-Respecting Smart Video Surveillance Based on Usage Control Enforcement
P Birnstill - 2016 - books.google.com
This research introduces a conceptual framework for enforcing privacy-related restrictions in
smart video surveillance systems based on danger levels and incident types to be handled …
smart video surveillance systems based on danger levels and incident types to be handled …
Knowledge Management System usage evaluation with logging and quantitative method
K Iskandar - 2016 International conference on information …, 2016 - ieeexplore.ieee.org
Knowledge Management System (KMS) function to support the Knowledge Management
process, to create, capture, share, reuse and optimize the knowledge. Knowledge …
process, to create, capture, share, reuse and optimize the knowledge. Knowledge …
Generic semantics specification and processing for inter-system information flow tracking
Data usually takes different shapes and appears as files, windows, processes' memory,
network connections, etc. Information flow tracking technology keeps an eye on these …
network connections, etc. Information flow tracking technology keeps an eye on these …
[PDF][PDF] Achieving accountability with distributed data usage control technology
A Pretschner - 2nd International Workshop on Accountability …, 2014 - mediatum.ub.tum.de
Distributed data usage control technology enforces obligations on future data usage in a
preventive or a detective manner. The goal of preventive enforcement is to make sure that a …
preventive or a detective manner. The goal of preventive enforcement is to make sure that a …
Cross-layer data-centric usage control
E Lovat - 2015 - mediatum.ub.tum.de
Usage control (UC) specifies what happens to data after access to it has been granted.
Within the system, data (eg “a picture”) exists in form of various representations, possibly …
Within the system, data (eg “a picture”) exists in form of various representations, possibly …
Umsetzung des datenschutzrechtlichen Auskunftsanspruchs auf Grundlage von Usage-Control und Data-Provenance-Technologien
PCS Bier - 2017 - mediatum.ub.tum.de
Die wachsende Komplexität moderner Informationssysteme erschwert die
Nachvollziehbarkeit der Speicherung und Verarbeitung personenbezogener Daten. Der …
Nachvollziehbarkeit der Speicherung und Verarbeitung personenbezogener Daten. Der …