咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是211-220 订阅
排序:
Limiting access to Unintentionally Leaked Sensitive Documents Using Malware Signatures  14
Limiting Access to Unintentionally Leaked Sensitive Document...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Guri, Mordechai Kedma, Gabi Carmeli, Buky Elovici, Yuval Ben Gurion Univ Negev Dept Informat Syst Engn Ben Gurion Univ IL-8410501 Beer Sheva Israel Ben Gurion Univ Negev Telekom Innovat Labs Ben Gurion Univ IL-8410501 Beer Sheva Israel
Organizations are repeatedly embarrassed when their sensitive digital documents go public or fall into the hands of adversaries, often as a result of unintentional or inadvertent leakage. Such leakage has been traditi... 详细信息
来源: 评论
What Are the Most Important Challenges for access control in New Computing Domains, such as Mobile, Cloud and Cyber-physical Systems?  14
What Are the Most Important Challenges for Access Control in...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Bauer, Lujo Kerschbaum, Florian Carnegie Mellon Univ Pittsburgh PA 15213 USA SAP Karlsruhe Germany
We are seeing a significant shift in the types and characteristics of computing devices that are commonly used. Today, more smartphones are sold than personal computers. An area of rapid growth are also cloud systems;... 详细信息
来源: 评论
DLS 2014 - Proceedings of the 10th symposium on Dynamic Languages, Part of SPLASH 2014
DLS 2014 - Proceedings of the 10th Symposium on Dynamic Lang...
收藏 引用
10th symposium on Dynamic Languages, DLS 2014 - Part of SPLASH 2014
the proceedings contain 14 papers. the topics discussed include: why do we know so little about programming languages, and what would have happened if we had known more?;scriptable operating systems with Lua;abstracti...
来源: 评论
Re-thinking Networked Privacy, Security, Identity and access control in our Surveillance States  14
Re-thinking Networked Privacy, Security, Identity and Access...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Clement, Andrew Univ Toronto Fac Informat 140 St George St Toronto ON M5S 3G6 Canada
Mass surveillance activities by the security agencies of the Five Eyes countries (e.g. NSA, CSEC, etc) pose a significant challenge to those who care about the privacy, security and other democratic rights related to ... 详细信息
来源: 评论
Achieving security assurance with assertion-based application construction
Achieving security assurance with assertion-based applicatio...
收藏 引用
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Carlos E. Rubio-Medrano Gail-Joon Ahn Karsten Sohr Ira A. Fulton Schools of Engineering Arizona State University Tempe Arizona USA Center for Computing Technologies (TZI) Universität Bremen Bremen Germany
Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs), which are essential to implement the desired functionalities of software applicatio... 详细信息
来源: 评论
An information flow control meta-model  13
An information flow control meta-model
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Kafura, Dennis Gracanin, Denis Department of Computer Science Virginia Tech. Blacksburg VA United States
In this paper a meta-model for information flow control is defined using the foundation of Barker's access control meta-model. the purposes for defining this meta-model is to achieve a more principled understandin... 详细信息
来源: 评论
A versatile access control implementation: Secure box  13
A versatile access control implementation: Secure box
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Botelho, Bruno Alves Pereira Pelluzi, Dennis Guimarães Nakamura, Emilio Tissato Fundação CPqD Rod. Campinas-Mogi-Mirim 13086-902 Campinas - SP Brazil
In this demonstration paper, we describe the implementation of a versatile access control prototype based on multimodal biometrics and graphical passwords that had been designed and developed aligned with the current ... 详细信息
来源: 评论
ERBAC: Event-driven RBAC  13
ERBAC: Event-driven RBAC
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Bonatti, Piero Galdi, Clemente Torres, Davide Dip. di Ingegneria Elettrica e Tecnologie dell'Informazione Università di Napoli Federico II Compl. Univ. Monte S. Angelo I-80126 Napoli Italy NTS Network S.p.A. Corso Monforte 2 20122 Milan Italy
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enf... 详细信息
来源: 评论
A storage-efficient cryptography-based access control solution for subversion  13
A storage-efficient cryptography-based access control soluti...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Leibenger, Dominik Sorge, Christoph University of Paderborn Warburger Straße 100 33098 Paderborn Germany
Version control systems are widely used in software development and document management. Unfortunately, versioning confidential files is not normally supported: Existing solutions encrypt the transport channel, but st... 详细信息
来源: 评论
Specification and analysis of access control policies for mobile applications  13
Specification and analysis of access control policies for mo...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Abdunabi, Ramadan Ray, Indrakshi France, Robert Computer Science Dept. Colorado State University Fort Collins CO 80523 United States
Mobile applications allow individuals on-the-move access to resources "anytime, anywhere" using hand-held mobile devices. We argue that for critical and sensitive resources this is often times not desirable ... 详细信息
来源: 评论