咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是291-300 订阅
排序:
access control via Belnap Logic: Intuitive, Expressive, and Analyzable Policy Composition
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 1–27页
作者: Bruns, Glenn Huth, Michael Alcatel Lucent Bell Labs Naperville IL 60563 USA Univ London Imperial Coll Sci Technol & Med Dept Comp London SW7 2AZ England
access control to IT systems increasingly relies on the ability to compose policies. Hence there is benefit in any framework for policy composition that is intuitive, formal (and so "analyzable" and "im... 详细信息
来源: 评论
Data-centric multi-layer usage control enforcement: A social network example  11
Data-centric multi-layer usage control enforcement: A social...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Lovat, Enrico Pretschner, Alexander Karlsruhe Institute of Technology Karlsruhe Germany
Usage control is concerned with how data is used after access to it has been granted. Data may exist in multiple representations which potentially reside at different layers of abstraction, including operating system,... 详细信息
来源: 评论
An integrated approach for identity and access management in a SOA context  11
An integrated approach for identity and access management in...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Hummer, Waldemar Gaubatz, Patrick Strembeck, Mark Zdun, Uwe Dustdar, Schahram Distributed Systems Group Information Systems Institute Vienna University of Technology Austria Software Architecture Group Faculty of Computer Science University of Vienna Austria Information Systems Institute Vienna University of Economics and Business Austria
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we defined a domainspecific language (DSL) fo... 详细信息
来源: 评论
Symbolic reachability analysis for parameterized administrative role-based access control
收藏 引用
COMPUTERS & SECURITY 2011年 第2-3期30卷 148-164页
作者: Stoller, Scott D. Yang, Ping Gofman, Mikhail I. Ramakrishnan, C. R. SUNY Stony Brook Dept Comp Sci Stony Brook NY 11794 USA SUNY Binghamton Dept Comp Sci Binghamton NY 13902 USA
Role-based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role-based access control (ARBAC) policy spec... 详细信息
来源: 评论
Practical and Efficient Cryptographic Enforcement of Interval-Based access control Policies
Practical and Efficient Cryptographic Enforcement of Interva...
收藏 引用
13th acm symposium on access control models and technologies
作者: Crampton, Jason Univ London Dept Math Informat Secur Grp Egham TW20 0EX Surrey England
the enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area h... 详细信息
来源: 评论
access control via Belnap Logic: Intuitive, Expressive, and Analyzable Policy Composition
Access Control via Belnap Logic: Intuitive, Expressive, and ...
收藏 引用
13th acm symposium on access control models and technologies
作者: Bruns, Glenn Huth, Michael Alcatel Lucent Bell Labs Naperville IL 60563 USA Univ London Imperial Coll Sci Technol & Med Dept Comp London SW7 2AZ England
access control to IT systems increasingly relies on the ability to compose policies. Hence there is benefit in any framework for policy composition that is intuitive, formal (and so "analyzable" and "im... 详细信息
来源: 评论
Authorization Recycling in Hierarchical RBAC Systems
Authorization Recycling in Hierarchical RBAC Systems
收藏 引用
13th acm symposium on access control models and technologies
作者: Wei, Qiang Crampton, Jason Beznosov, Konstantin Ripeanu, Matei CCB Int Holdings Ltd Hong Kong Hong Kong Peoples R China Univ London Dept Math Egham TW20 0EX Surrey England Univ British Columbia Dept Elect & Comp Engn Vancouver BC V6T 1Z4 Canada
As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a singl... 详细信息
来源: 评论
A Novel Multichannel Cognitive Radio Network with throughput Analysis at Saturation Load
A Novel Multichannel Cognitive Radio Network with Throughput...
收藏 引用
10th IEEE International symposium on Network Computing and Applications (NCA)
作者: Hasan, Rashidul Murshed, Manzur Monash Univ Gippsland Sch Informat Technol Churchill Vic 3842 Australia
Opportunistic access of licensed spectrum using a cognitive radio network (CRN) is getting research attraction due to its ability to improve utilisation of this scarce resource without affecting the primary users (PUs... 详细信息
来源: 评论
DC Proposal: Knowledge Based access control Policy Specification and Enforcement
DC Proposal: Knowledge Based Access Control Policy Specifica...
收藏 引用
Semantic Web Challenge at the 10th International Semantic Web Conference
作者: Kirrane, Sabrina Natl Univ Ireland Digital Enterprise Res Inst Galway Ireland
the explosion of digital content and the heterogeneity of enterprise content sources have resulted in a pressing need for advanced tools and technologies, to support enterprise content search and analysis. Semantic te... 详细信息
来源: 评论
IB-MAC: Improvement of the backoff algorithm for better MAC - TCP protocols interactions in MANET
IB-MAC: Improvement of the backoff algorithm for better MAC ...
收藏 引用
International symposium on Programming and Systems
作者: Hamrioui, Sofiane Lalam, Mustapha University of Technology Sciences Houari Boumediene Algiers Algeria University Mouloud Mammeri Tizi Ouzou Algeria
In this paper, we will study the interactions between medium access control (MAC) and Transfer control Protocol (TCP) protocols. these interactions will be done with some of the IETF standardised reactive (AODV, DSR) ... 详细信息
来源: 评论