咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是221-230 订阅
排序:
Heuristic safety analysis of access control models  13
Heuristic safety analysis of access control models
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Amthor, Peter Kühnhauser, Winfried E. Pölck, Anja Ilmenau University of Technology Germany
Model-based security engineering uses formal security models for specifying and analyzing access control systems. Tool-based model analysis encounters a fundamental difficulty here: on the one hand, real-world access ... 详细信息
来源: 评论
Secure benchmarking in the cloud  13
Secure benchmarking in the cloud
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Schroepfer, Axel Schaad, Andreas Kerschbaum, Florian Boehm, Heiko Jooss, Joerg SAP Research Security and Trust Vincenz-Priessnitz Str. 1 76131 Karlsruhe Germany Microsoft Deutschland GmbH Konrad-Zuse-Straße 1 85716 Unterschleißheim Germany
Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business proces... 详细信息
来源: 评论
A BigData platform for analytics on access control policies and logs  13
A BigData platform for analytics on access control policies ...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Chari, Suresh Habeck, Ted Molloy, Ian Park, Youngja Teiken, Wilfried IBM Research T.J. Watson Yorktown Heights NY United States
Relying on an access control security policy alone to protect valuable resources is a dangerous practice. Prudent security must engage in other risk management and mitigation techniques to rapidly detect and recover f... 详细信息
来源: 评论
Data Model and Data access control Method on Service Platform for Smart Public Infrastructure  10
Data Model and Data Access Control Method on Service Platfor...
收藏 引用
10th International Conference on E-Business (ICE-B)
作者: Kawada, Yohei Yano, Kojin Mizuno, Yoshihiro Terada, Hirofumi Hitachi Ltd Informat & Telecommun Syst Co Tokyo Japan Hitachi Ltd Yokohama Res Lab Yokohama Kanagawa Japan
In the smart city projects that will "smartize" urban infrastructures, a new access control technology is needed to offer appropriate consumer data to appropriate applications. In this paper, we analyze char... 详细信息
来源: 评论
Sticky policies for mobile devices  13
Sticky policies for mobile devices
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Di Cerbo, Francesco Trabelsi, Slim Steingruber, thomas Dodero, Gabriella Bezzi, Michele Applied Research Security and Trust SAP Labs France 805 av. Donat 06250 Mougins France Free University of Bozen-Bolzano Piazza Universitá 1 39100 Bolzano-Bozen Italy
Mobile devices consume significant amounts of information, from different sources. thus they often deal also with sensitive or confidential data, in places or situations that could be not appropriate, or not compliant... 详细信息
来源: 评论
Enabling intensional access control via preference-aware query optimization  13
Enabling intensional access control via preference-aware que...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Farnan, Nicholas L. Lee, Adam J. Chrysanthis, Panos K. Yu, Ting Department of Computer Science University of Pittsburgh Pittsburgh PA United States Department of Computer Science North Carolina State University Raleigh NC United States
Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evalua... 详细信息
来源: 评论
Content-based information protection and release in NATO operations  13
Content-based information protection and release in NATO ope...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Armando, Alessandro Grasso, Matteo Oudkerk, Sander Ranise, Silvio Wrona, Konrad DIBRIS U. of Genova Italy Security and Trust Unit FBK-Irst Trento Italy Agent Sierra Consultancy Services Amsterdam Netherlands NATO Communications and Information Agency The Hague Netherlands
the successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted u... 详细信息
来源: 评论
Beyond accountability: Using obligations to reduce risk exposure and deter insider attacks  13
Beyond accountability: Using obligations to reduce risk expo...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Baracaldo, Nathalie Joshi, James University of Pittsburgh School of Information Sciences United States
Recently, the importance of including obligations as part of access control systems for privilege management, for example, in healthcare information systems, has been well recognized. In an access control system, an a... 详细信息
来源: 评论
SacmAT'12 - Proceedings of the 17th acm symposium on access control models and technologies
SACMAT'12 - Proceedings of the 17th ACM Symposium on Access ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
the proceedings contain 27 papers. the topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for access control policies: applications to role mining over logs wi...
来源: 评论
On the notion of redundancy in access control policies  13
On the notion of redundancy in access control policies
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Guarnieri, Marco Neri, Mario Arrigoni Magri, Eros Mutti, Simone Institute of Information Security ETH Zürich Switzerland Università degli Studi Bergamo Italy Comelit R and D Comelit Group S.p.A Italy
the evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may incr... 详细信息
来源: 评论