×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [62]
内容类型
会议论文 [62]
发表日期
2014 [1]
2013 [6]
2012 [8]
2011 [11]
2010 [7]
2009 [8]
更多...
学科主题
计算机科学技术基础学... [1]
计算机系统结构::计... [1]
计算机软件::操作系... [1]
计算机软件::程序设... [1]
计算机软件::编译系... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共62条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:软件研究所
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Denial-of-service security attack in the continuous-time world
会议论文
34th IFIPWG6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3, 2014 - June 5, 2014
Wang, Shuling (1)
;
Nielson, Flemming (2)
;
Nielson, Hanne Riis (2)
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2014/12/16
Hybrid systems
Denial-of-service
Safety verification
Inference system
hGuard: A Framework to Measure Hypervisor Critical Files
会议论文
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Ding, Baozeng
;
He, Yeping
;
Zhou, Qiming
;
Wu, Yanjun
;
Wu, Jingzheng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2014/12/16
Hypervisor
critical files
integrity
measurement
KP-ABE based Verifiable Cloud Access Control Scheme
会议论文
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, AUSTRALIA, JUL 16-18, 2013
Si, Xiaolin
;
Wang, Pengpian
;
Zhang, Liwu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2014/12/16
control
cloud computing
verifiable computation
KP-ABE
XACML
Quantitatively Measure Access Control Mechanisms Across Different Operating Systems
会议论文
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Cheng, Liang
;
Zhang, Yang
;
Han, Zhihui
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2014/12/16
Security Measurement
Vulnerability Profile
Operating System
Logic Programming
基于Biba模型的三权分立分析
会议论文
第七届中国可信计算与信息安全学术会议, 秦皇岛, 2013
黎琳
;
禄凯
;
国强
;
陈永刚
;
范修斌
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
信息安全
强制访问控制
Biba模型
三权分立
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data
会议论文
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Ding, Baozeng
;
He, Yeping
;
Wu, Yanjun
;
Lin, Yuqi
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2014/12/16
virtualization
hypervisor introspection
non-control data
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
会议论文
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang
;
Meining Nie
;
Purui Su
;
Dengguo Feng
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2013/12/02
Sandbox
Hypervisor based security
Hardware assisted virtualization
Cloud computing
modeling and quantifying the dependability based on pepa
会议论文
Future Computer and Control Systems, FCCS 2012, Changsha, China, April 21, 2012 - April 22, 2012
Guo Yunchuan
;
Zhang Dongyan
;
Yin Lihua
;
Qian Junyan
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/22
Security of data
research on soybean security of china based on system dynamics
会议论文
31st Chinese Control Conference, CCC 2012, Hefei, China, July 25, 2012 - July 27, 2012
Zhu Ting
;
Duan Jia-Xi
;
Gao Mg-He
;
Zhang Chu-Qun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Food supply
Industry
International trade
Security systems
System theory
an attribute based encryption scheme with fine-grained attribute revocation
会议论文
2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, United states, December 3, 2012 - December 7, 2012
Li Qiang
;
Feng Dengguo
;
Zhang Liwu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Access control
Communication
©版权所有 ©2017 CSpace - Powered by
CSpace