咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是251-260 订阅
排序:
Modeling context for access control systems
Modeling context for access control systems
收藏 引用
2012 IEEE 10th Jubilee International symposium on Intelligent Systems and Informatics, SISY 2012
作者: Sladić, G. Milosavljević, B. Konjović, Z. Faculty of Technical Sciences University of Novi SadSerbia Novi Sad Serbia
access control is one of key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this paper, we present a particular context model for... 详细信息
来源: 评论
Algorithms for mining meaningful roles  12
Algorithms for mining meaningful roles
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Xu, Zhongyuan Stoller, Scott D. Department of Computer Science Stony Brook University United States
Role-based access control (RBAC) offers significant advantages over lower-level access control policy representations, such as access control lists (ACLs). However, the effort required for a large organization to migr... 详细信息
来源: 评论
A framework for verification and optimal reconfiguration of event-driven role based access control policies  12
A framework for verification and optimal reconfiguration of ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Shafiq, Basit Vaidya, Jaideep Ghafoor, Arif Bertino, Elisa Computer Science Dept. LUMS DHA Lahore Pakistan MSIS Dept. CIMIC Rutgers University 1 Washington Park Newark NJ 07102 United States School of ECE Purdue University 465 Northwestern Ave. West Lafayette IN 47907 United States Computer Science Dept. Purdue University 305 N. University Street West Lafayette IN 47907 United States
Role based access control (RBAC) is the de facto model used for advanced access control due to its inherent richness and flexibility. Despite its great success at modeling a variety of organizational needs, maintainin... 详细信息
来源: 评论
Policy-by-example for online social networks  12
Policy-by-example for online social networks
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Cheek, Gorrell P. Shehab, Mohamed College of Computing and Informatics University of North Carolina at Charlotte Charlotte NC 28223 United States
We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group ... 详细信息
来源: 评论
Fine-grained access control of personal data  12
Fine-grained access control of personal data
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Wang, Ting Srivatsa, Mudhakar Liu, Ling IBM Research United States Georgia Tech United States
the immensity and variety of personal information (e.g., profile, photo, and microblog) on social sites require access control policies tailored to individuals' privacy needs. Today such policies are still mainly ... 详细信息
来源: 评论
access control for RDF graphs using abstract models  12
Access control for RDF graphs using abstract models
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Papakonstantinou, Vassilis Michou, Maria Fundulaki, Irini Flouris, Giorgos Antoniou, Grigoris FORTH-ICS Greece University of Crete Greece University of Huddersfield United Kingdom
the Resource Description Framework (RDF) has become the defacto standard for representing information in the Semantic Web. Given the increasing amount of sensitive RDF data available on the Web, it becomes increasingl... 详细信息
来源: 评论
An Adaptive access control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks
An Adaptive Access Control Model with Privileges Overriding ...
收藏 引用
8th acm symposium on Quality of Service and Security for Wireless and Mobile Networks (Q2SWinet)
作者: Maw, Htoo Aung Xiao, Hannan Christianson, Bruce Univ Hertfordshire Hatfield AL10 9AB Herts England
Wireless Sensor Networks (WSNs) have attracted a lot of interest in the research community because of their wide range of applications. Due to the distributed nature of WSNs and their deployment in remote areas, these... 详细信息
来源: 评论
Generative models for access control policies: Applications to role mining over logs with attribution  12
Generative models for access control policies: Applications ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Molloy, Ian Park, Youngja Chari, Suresh IBM Research TJ Watson Hawthorne NY United States
We consider a fundamentally new approach to role and policy mining: finding RBAC models which reflect the observed usage of entitlements and the attributes of users. Such policies are interpretable, i.e., there is a n... 详细信息
来源: 评论
A framework integrating attribute-based policies into role-based access control  12
A framework integrating attribute-based policies into role-b...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Huang, Jingwei Nicol, David M. Bobba, Rakesh Huh, Jun Ho Information Trust Institute University of Illinois at Urbana-Champaign 1308 W. Main St. Urbana IL 61801 United States
Integrated role-based access control (RBAC) and attribute-based access control (ABAC) is emerging as a promising paradigm. this paper proposes a framework that uses attribute based policies to create a more traditiona... 详细信息
来源: 评论
SacmAT'11 - Proceedings of the 16th acm symposium on access control models and technologies
SACMAT'11 - Proceedings of the 16th ACM Symposium on Access ...
收藏 引用
16th acm symposium on access control models and technologies, SacmAT 2011
the proceedings contain 22 papers. the topics discussed include: a decade of model-driven security;deriving role engineering artifacts from business processes and scenario models;an integrated approach for identity an...
来源: 评论