咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是321-330 订阅
排序:
StateMiner: An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy
StateMiner: An Efficient Similarity-Based Approach for Optim...
收藏 引用
15th acm symposium on access control models and technologies
作者: Takabi, Hassan Joshi, James B. D. Univ Pittsburgh Sch Informat Sci Pittsburgh PA 15260 USA
Recently, there is a growing trend of organizations migrating to RBAC because of the economic benefits that RBAC provides, and the ease of administration. In order to deploy an RBAC system, one requires to first ident... 详细信息
来源: 评论
An Architecture for Enforcing End-to-End access control Over Web Applications
An Architecture for Enforcing End-to-End Access Control Over...
收藏 引用
15th acm symposium on access control models and technologies
作者: Hicks, Boniface Rueda, Sandra King, Dave Moyer, thomas Schiffman, Joshua Sreenivasan, Yogesh McDaniel, Patrick Jaeger, Trent Penn State Univ Dept Comp Sci & Engn Syst & Internet Infrastruct Secur Lab University Pk PA 16802 USA
the web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from multiple applications originating at ... 详细信息
来源: 评论
Automated Management of Network access control from Design to Enforcement  10
Automated Management of Network Access Control from Design t...
收藏 引用
15th acm symposium on access control models and technologies
作者: Al-Shaer, Ehab Univ N Carolina Charlotte Sch Comp & Informat Charlotte NC USA
Recent studies show that more than 65% of the network vulnerabilities are due to misconfigured network access control. Arbor Networks in their ISP survey shows that managing access control is the top challenge in ISP ...
来源: 评论
A File-Type Sensitive, Auto-Versioning File System  10
A File-Type Sensitive, Auto-Versioning File System
收藏 引用
10th acm symposium on Document Engineering
作者: Mueller, Arthur Roennau, Sebastian Borghoff, Uwe M. Univ Bundeswehr Munchen Inst Software Technol D-85577 Neubiberg Germany
Auto-versioning file systems offer a simple and reliable interface to document change control. the implicit versioning of documents at each write access catches the whole evolution of a document, thus supporting regul... 详细信息
来源: 评论
EGSI: TGKA based security architecture for group communication in grid  10
EGSI: TGKA based security architecture for group communicati...
收藏 引用
10th IEEE/acm International symposium on Cluster, Cloud, and Grid Computing, CCGrid 2010
作者: Ingle, Rajesh Sivakumar, G. Department of Computer Science and Engineering Indian Institute of Technology Bombay Mumbai India
Security is one of the most important issues in the grid. Several processes generated by a user need to communicate securely. the existing architectures do not provide support for secure group communication in grid. G... 详细信息
来源: 评论
Differential access for Publicly-Posted Composite Documents with Multiple Workflow Participants  10
Differential Access for Publicly-Posted Composite Documents ...
收藏 引用
10th acm symposium on Document Engineering
作者: Balinsky, Helen Y. Simske, Steven J. Hewlett Packard Labs Bristol BS34 8QZ Avon England
A novel mechanism for providing and enforcing differential access control for publicly-posted composite documents is proposed. the concept of a document is rapidly changing: individual file-based, traditional formats ... 详细信息
来源: 评论
TrustStore: Making Amazon S3 trustworthy with services composition  10
TrustStore: Making Amazon S3 trustworthy with services compo...
收藏 引用
10th IEEE/acm International symposium on Cluster, Cloud, and Grid Computing, CCGrid 2010
作者: Yao, Jinhui Chen, Shiping Nepal, Surya Levy, David Zic, John School of Electrical and Information Engineering University of Sydney Sydney Australia Networking Technologies Laboratory CSIRO ICT Centre Australia Sydney Australia
the enormous amount of data generated in daily operations and the increasing demands for data accessibility across organizations are pushing individuals and organizations to outsource their data storage to cloud stora... 详细信息
来源: 评论
Adaptive bandwidth allocation for per-station fairness on wireless access router
Adaptive bandwidth allocation for per-station fairness on wi...
收藏 引用
2010 10th International symposium on Communications and Information technologies, ISCIT 2010
作者: Visoottiviseth, Vasaka Trunganont, Akkasit Siwamogsatham, Siwaruk Faculty of Information and Communication Technology Mahidol University Thailand National Electronics and Computer Technology Center Thailand
According to the nature of IEEE 802.11 wireless LAN, the bandwidth is shared among wireless devices. However, the bandwidth could not be fairly shared among stations, because some users may use greedy applications whi... 详细信息
来源: 评论
SacmAT'09 - Proceedings of the 14th acm symposium on access control models and technologies
SACMAT'09 - Proceedings of the 14th ACM Symposium on Access ...
收藏 引用
14th acm symposium on access control models and technologies, SacmAT 2009
the proceedings contain 24 papers. the topics discussed include: safety in discretionary access control for logic-based publish-subscribe systems;ensuring spatio-temporal access control for real-world applications;an ...
来源: 评论
A Web-Based Collaborative Metamodeling Environment with Secure Remote Model access
A Web-Based Collaborative Metamodeling Environment with Secu...
收藏 引用
10th International Conference on Web Engineering
作者: Farwick, Matthias Agreiter, Berthold White, Jules Forster, Simon Lanzanasto, Norbert Breu, Ruth Univ Innsbruck Inst Comp Sci A-6020 Innsbruck Austria Vanderbilt Univ Elect Engn & Comp Sci Nashville TN USA
this contribution presents GEMSjax - a web-based metamodeling tool for the collaborative development of domain specific languages. By making use of modern Web 2.0 technologies like Ajax and REST services, the tool all... 详细信息
来源: 评论