咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是301-310 订阅
排序:
Session details: Data flow and access control  11
Session details: Data flow and access control
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Elisa Bertino Purdue University
No abstract available.
来源: 评论
Usable access control for all  11
Usable access control for all
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Robert W. Reeder Microsoft Redmond WA USA
No abstract available.
来源: 评论
Session details: Distributed processing and access control  11
Session details: Distributed processing and access control
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Murat Kantarcioglu University of Texas at Dallas
No abstract available.
来源: 评论
Session details: Logic programming based access control specification  11
Session details: Logic programming based access control spec...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: David Basin ETH Zurich
No abstract available.
来源: 评论
SIGMA - SemantIc Government Mash-Up Application: Using Semantic Web technologies to Provide access to Governmental Data
SIGMA - SemantIc Government Mash-Up Application: Using Seman...
收藏 引用
International symposium on Parallel and Distributed Computing
作者: Claudia Gheorghiu Radu Nicolescu Andrei Vasile Bogdan Cristian Ochisor Sabin C. Buraga Lenuta Alboaie Faculty of Computer Science Alexandru Ioan Cuza University Iasi Romania
the paper presents SIGMA (Semantic Government Mash-up Application), a platform able to create mash-ups by providing access to open governmental data. the proposed solution is based on the existing semantic Web technol... 详细信息
来源: 评论
Proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
Proceedings of acm symposium on access control models and technologies, SacmAT 2010年 iii页
作者: Joshi, James Carminati, Barbara University of Pittsburgh United States University of Insubria Italy
来源: 评论
access controls for Oblivious and Anonymous Systems
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 10-10页
作者: Coull, Scott E. Green, Matthew Hohenberger, Susan RedJack Silver Spring MD 20901 USA Johns Hopkins Univ Baltimore MD 21218 USA
the use of privacy-enhancing cryptographic protocols, such as anonymous credentials and oblivious transfer, could have a detrimental effect on the ability of providers to effectively implement access controls on their... 详细信息
来源: 评论
Demo abstract: Diagnostic tracing of wireless sensor networks with TinyTracer
Demo abstract: Diagnostic tracing of wireless sensor network...
收藏 引用
International symposium on Information Processing in Sensor Networks (IPSN)
作者: Vinaitheerthan Sundaram Patrick Eugster Xiangyu Zhang School of Electrical and Computer Engineering Purdue University West Lafayette IN USA Department of Computer Science Purdue University West Lafayette IN USA
Run-time debugging tools are required to detect and diagnose post-deployment failures in wireless sensor networks. Reproducing a failure from the trace of past events can play a crucial role in diagnosis. We describe ... 详细信息
来源: 评论
Practical and Efficient Cryptographic Enforcement of Interval-Based access control Policies
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 14-14页
作者: Crampton, Jason Univ London Dept Math Informat Secur Grp Egham TW20 0EX Surrey England
the enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area h... 详细信息
来源: 评论
Authorization Recycling in Hierarchical RBAC Systems
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 3-3页
作者: Wei, Qiang Crampton, Jason Beznosov, Konstantin Ripeanu, Matei CCB Int Holdings Ltd Hong Kong Hong Kong Peoples R China Univ London Dept Math Egham TW20 0EX Surrey England Univ British Columbia Dept Elect & Comp Engn Vancouver BC V6T 1Z4 Canada
As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a singl... 详细信息
来源: 评论