咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是241-250 订阅
排序:
A Model-driven Approach for Securing Software Architectures
A Model-driven Approach for Securing Software Architectures
收藏 引用
10th International Conference on Security and Cryptography (SECRYPT)
作者: Neri, Mario Arrigoni Guarnieri, Marco Magri, Eros Mutti, Simone Paraboschi, Stefano Univ Bergamo Dip Ingn Informat & Metodi Matemat Bergamo Italy Swiss Fed Inst Technol Inst Informat Secur Zurich Switzerland Comelit Grp SpA Comelit R&D Rovetta S Lorenzo Italy
Current IT systems consist usually of several components and services that communicate and exchange data over the Internet. they have security requirements that aim at avoiding information disclosure and at showing co... 详细信息
来源: 评论
Incorporate Sensor Data and Dynamic Modeling for Real Time control of Sewer Systems
Incorporate Sensor Data and Dynamic Modeling for Real Time C...
收藏 引用
10th IFIP WG 5.11 International symposium on Environmental Software Systems (ISESS)
作者: de Rooij, Erik van Heeringen, Klaas-Jan Deltares NL-2600 MH Delft Netherlands
We discuss how Delft-FEWS is applied to incorporate real-time sensor data and dynamic modeling to allow Real Time control (RTC) of three sewer systems in the area of the Hoeksche Waard, the Netherlands. the purpose of... 详细信息
来源: 评论
Towards a policy enforcement infrastructure for distributed usage control  12
Towards a policy enforcement infrastructure for distributed ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Kelbert, Florian Pretschner, Alexander Karlsruhe Institute of Technology Am Fasanengarten 5 Karlsruhe Germany
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an applica... 详细信息
来源: 评论
Encryption-enforced access control for an RFID Discovery Service  12
Encryption-enforced access control for an RFID Discovery Ser...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Kerschbaum, Florian Chaves, Leonardo Weiss Ferreira Department of Privacy and Data Security Technical University Dresden Germany SAP AG SAP Research Center Karlsruhe Germany
In this demonstration we present a novel encryption scheme for enforcing access control in a Discovery Service. A Discovery Service is a piece of software that allows one to "discover" item-level data which ... 详细信息
来源: 评论
A model-based approach to automated testing of access control policies  12
A model-based approach to automated testing of access contro...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Xu, Dianxiang thomas, Lijo Kent, Michael Mouelhi, Tejeddine Le Traon, Yves National Center for the Protection of the Financial Infrastructure Dakota State University Madison SD 57042 United States Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg Campus Kirchberg L-1359 Luxembourg
access control policies in software systems can be implemented incorrectly for various reasons. this paper presents a model-based approach for automated testing of access control implementation. To feed the model-base... 详细信息
来源: 评论
SCUTA: A server-side access control system for web applications  12
SCUTA: A server-side access control system for web applicati...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Tan, Xi Du, Wenliang Luo, Tongbo Soundararaj, Karthick D. Dept. of Electrical Engineering and Computer Science Syracuse University Syracuse NY United States
the Web is playing a very important role in our lives, and is becoming an essential element of the computing infrastructure. Unfortunately, its importance makes it the preferred target of attacks. Web-based vulnerabil... 详细信息
来源: 评论
Practical risk aggregation in RBAC models  12
Practical risk aggregation in RBAC models
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Chari, Suresh Lobo, Jorge Molloy, Ian IBM Research TJ Watson Hawthorne NY United States
this paper describes our system, built as part of a commercially available product, for inferring the risk in an RBAC policy model, i.e., the assignment of permissions to roles and roles to users. Our system implement... 详细信息
来源: 评论
PlexC: A policy language for exposure control  12
PlexC: A policy language for exposure control
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Le Gall, Yann Lee, Adam J. Kapadia, Apu Department of Computer Science University of Pittsburgh Pittsburgh PA United States School of Informatics and Computing Indiana University Bloomington Bloomington IN United States
With the widespread use of online social networks and mobile devices, it is not uncommon for people to continuously broadcast contextual information such as their current location or activity. these technologies prese... 详细信息
来源: 评论
Analyzing temporal role based access control models  12
Analyzing temporal role based access control models
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Uzun, Emre Atluri, Vijayalakshmi Sural, Shamik Vaidya, Jaideep Parlato, Gennaro Ferrara, Anna Lisa Madhusudan, P. Rutgers University United States Indian Institute of Technology India University of Southampton United Kingdom University of Bristol United Kingdom University of Illinois at Urbana-Champaign United States
Today, Role Based access control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the authorization as well as the admini... 详细信息
来源: 评论
SecureBPMN: Modeling and enforcing access control requirements in business processes  12
SecureBPMN: Modeling and enforcing access control requiremen...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Brucker, Achim D. Hang, Isabelle Lückemeyer, Gero Ruparel, Raj SAP Research Vincenz-Priessnitz-Str. 1 76131 Karlsruhe Germany Hochschule für Technik Stuttgart Schellingstr. 24 70174 Stuttgart Germany
Modern enterprise systems have to comply to regulations such as Basel III resulting in complex security requirements. these requirements need to be modeled at design-time and enforced at runtime. Moreover, modern ente... 详细信息
来源: 评论