咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是171-180 订阅
排序:
Preventing information inference in access control  15
Preventing information inference in access control
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Paci, Federica Zannone, Nicola University of Southampton United Kingdom Eindhoven University of Technology Netherlands
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy conce... 详细信息
来源: 评论
Relationship-based access control for an open-source medical records system  15
Relationship-based access control for an open-source medical...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Rizvi, Syed Zain R. Fong, Philip W.L. Crampton, Jason Sellwood, James University of Calgary AB Canada Royal Holloway University of London Egham United Kingdom
Inspired by the access control models of social network systems, Relationship-Based access control (ReBAC) was recently proposed as a general-purpose access control paradigm for application domains in which authorizat... 详细信息
来源: 评论
Federated access management for collaborative network environments: Framework and case study  15
Federated access management for collaborative network enviro...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Rubio-Medrano, Carlos E. Zhao, Ziming Doupé, Adam Ahn, Gail-Joon Arizona State University TempeAZ United States
With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of being involved in inter-organizational, mul... 详细信息
来源: 评论
Mitigating access control vulnerabilities through interactive static analysis  15
Mitigating access control vulnerabilities through interactiv...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Zhu, Jun Chu, Bill Lipford, Heather thomas, Tyler University of North Carolina at Charlotte CharlotteNC28223 United States
access control vulnerabilities due to programming errors have consistently ranked amongst top software vulnerabilities. Previous research efforts have concentrated on using automatic program analysis techniques to det... 详细信息
来源: 评论
On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval  15
On missing attributes in access control: Non-deterministic a...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Crampton, Jason Morisset, Charles Zannone, Nicola Royal Holloway University of London United Kingdom Newcastle University United Kingdom Eindhoven University of Technology Netherlands
Attribute Based access control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are defined in terms of pairs attribute names... 详细信息
来源: 评论
Using JavaScript and WebCL for Numerical Computations: A Comparative Study of Native and Web technologies  10
Using JavaScript and WebCL for Numerical Computations: A Com...
收藏 引用
10th symposium on Dynamic Languages
作者: Khan, Faiz Foley-Bourgon, Vincent Kathrotia, Sujay Lavoie, Erick Hendren, Laurie McGill Univ Montreal PQ H3A 2T5 Canada
From its modest beginnings as a tool to validate forms, JavaScript is now an industrial-strength language used to power online applications such as spreadsheets, IDEs, image editors and even 3D games. Since all modern... 详细信息
来源: 评论
Mohawk+T: Efficient analysis of administrative temporal role-based access control (ATRBAC) policies  15
Mohawk+T: Efficient analysis of administrative temporal role...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Shahen, Jonathan Niu, Jianwei Tripunitara, Mahesh University of Waterloo Canada University of Texas San Antonio United States
Safety analysis is recognized as a fundamental problem in access control. It has been studied for various access control schemes in the literature. Recent work has proposed an administrative model for Temporal Role-Ba... 详细信息
来源: 评论
Semantic Degrees for Industrie 4.0 Engineering Deciding on the Degree of Semantic Formalization to Select Appropriate technologies  2015
Semantic Degrees for Industrie 4.0 Engineering Deciding on t...
收藏 引用
10th Joint Meeting of the European Software Engineering Conference (ESEC) / acm SIGSOFT symposium on the Foundations of Software Engineering (FSE)
作者: Cheng, Chih-Hong Guelfirat, Tuncay Messinger, Christian Schmitt, Johannes O. Schnelte, Matthias Weberabb, Peter ABB Corp Res Ctr Ladenburg Germany
Under the context of Industrie 4.0 (I4.0), future production systems provide balanced operations between manufacturing flexibility and efficiency, realized in an autonomous, horizontal, and decentralized item-level pr... 详细信息
来源: 评论
AppPolicyModules: Mandatory access control for third-party apps  15
AppPolicyModules: Mandatory Access Control for third-party a...
收藏 引用
10th acm symposium on Information, Computer and Communications Security, ASIACCS 2015
作者: Bacis, Enrico Mutti, Simone Paraboschi, Stefano Università degli Studi di Bergamo Italy Department of Management Information and Production Engineering Italy
Android has recently introduced the support for Mandatory access control, which extends previous security services relying on the Android Permission Framework and on the kernel-level Discretionary access control. this... 详细信息
来源: 评论
Towards an automatic top-down role engineering approach using natural language processing techniques  15
Towards an automatic top-down role engineering approach usin...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Narouei, Masoud Takabi, Hassan Department of Computer Science and Engineering University of North Texas DentonTX United States
Role Based access control (RBAC) is the most widely used model for access control due to the ease of administration as well as economic benefits it provides. In order to deploy an RBAC system, one requires to first id... 详细信息
来源: 评论