咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是271-280 订阅
排序:
An OWL representation of the MLO model
An OWL representation of the MLO model
收藏 引用
International symposium on Intelligent Systems and Informatics (SISY)
作者: Milan Segedinac Zora Konjović Dušan Surla Goran Savić Department of Computing and Control Faculty of technical Sciences Novi Sad Serbia Department of Mathematics and Informatics Faculty of Sciences Novi Sad Serbia
Learning opportunities play an important role in the vision of curriculum favored by the Bologna Process. this paper proposes an ontology intended for representing learning opportunities. the ontology is designed in a... 详细信息
来源: 评论
Hardware-enhanced access control for cloud computing  12
Hardware-enhanced access control for cloud computing
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: Ruby B. Lee Princeton University Princeton NJ USA
Future trustworthy computer systems should provide built-in support for at least the cornerstone security properties of confidentiality, integrity and availability. access control can help significantly towards achiev... 详细信息
来源: 评论
access control for a federated police information system  11
Access control for a federated police information system
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Hudnall, Matthew Mitchell, Maury Parrish, Allen Center for Advanced Public Safety University of Alabama Tuscaloosa AL 35487-0290 United States Alabama Criminal Justice Info. Center 201 South Union Street Montgomery AL 36130 United States
In this paper, we present the elements of a system for demonstration that supports a federated infrastructure for a collection of police agencies. © 2011 acm.
来源: 评论
xfACL: An extensible functional language for access control  11
xfACL: An extensible functional language for access control
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Ni, Qun Bertino, Elisa Department of Computer Science Purdue University W. Lafayette IN 47906 United States
the main goal of modern access control policy languages is to offer high-level languages, by using which security officers and application developers can express a large variety of access restrictions and isolate the ... 详细信息
来源: 评论
Semantic web-based social network access control
收藏 引用
COMPUTERS & SECURITY 2011年 第2-3期30卷 108-115页
作者: Carminati, Barbara Ferrari, Elena Heatherly, Raymond Kantarcioglu, Murat thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75080 USA Univ Insubria Varese Italy
the existence of online social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community organization. On the other hand, security... 详细信息
来源: 评论
SEAL: A logic programming framework for specifying and verifying access control models  11
SEAL: A logic programming framework for specifying and verif...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Naldurg, Prasad Raghavendra, K.R. Microsoft Research India Bangalore India Indian Institute of Science Bangalore India
We present SEAL, a language for specification and analysis of safety properties for label-based access control systems. A SEAL program represents a possibly infinite-state non-deterministic transition system describin... 详细信息
来源: 评论
Detecting and Resolving Policy Misconfigurations in access-control Systems  08
Detecting and Resolving Policy Misconfigurations in Access-C...
收藏 引用
13th acm symposium on access control models and technologies
作者: Bauer, Lujo Garriss, Scott Reiter, Michael K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Google Mountain View CA 94043 USA Univ N Carolina Dept Comp Sci Chapel Hill NC 27599 USA
access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration, and, in the context of particular applications (e. g., health care), very severe conseq... 详细信息
来源: 评论
Relationship-based access control policies and their policy languages  11
Relationship-based access control policies and their policy ...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Fong, Philip W.L. Siahaan, Ida Department of Computer Science University of Calgary Calgary AL Canada
the Relationship-Based access control (ReBAC) model was recently proposed as a general-purpose access control model. It supports the natural expression of parameterized roles, the composition of policies, and the dele... 详细信息
来源: 评论
Anomaly discovery and resolution in Web access control policies  11
Anomaly discovery and resolution in Web access control polic...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Hu, Hongxin Ahn, Gail-Joon Kulkarni, Ketan Arizona State University Tempe AZ 85287 United States
the advent of emerging technologies such asWeb services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from un... 详细信息
来源: 评论
Program synthesis in administration of higher-order permissions  11
Program synthesis in administration of higher-order permissi...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Bruns, Glenn Huth, Michael Avijit, Kumar Bell Labs Alcatel-Lucent United States Imperial College London United Kingdom Carnegie Mellon University United States
In "administrative" access control, policy controls permissions not just on application actions, but also on actions to modify permissions, on actions to modify permissions on those actions, and so on. One c... 详细信息
来源: 评论