咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是381-390 订阅
排序:
Fast Exact and Heuristic Methods for Role Minimization Problems  08
Fast Exact and Heuristic Methods for Role Minimization Probl...
收藏 引用
13th acm symposium on access control models and technologies
作者: Ene, Alina Rao, Prasad Horne, William Schreiber, Robert Milosavljevic, Nikola Tarjan, Robert E. Princeton Univ Dept Comp Sci Princeton NJ 08540 USA
We describe several new bottom-up approaches to problems in role engineering for Role-Based access control (RBAC). the salient problems are all NP-complete, even to approximate, yet we find that in instances that aris... 详细信息
来源: 评论
New constructions for provably-secure time-bound hierarchical key assignment schemes  07
New constructions for provably-secure time-bound hierarchica...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: De Santis, Alfredo Ferrara, Anna Lisa Masucci, Barbara Univ Salerno Dipartimento Informat & Applicaz I-84084 Fisciano SA Italy
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the... 详细信息
来源: 评论
A rewriting framework for the composition of access control policies  08
A rewriting framework for the composition of access control ...
收藏 引用
PPDP 2008: 10th International acm SIGPLAN symposium on Principles and Practice of Declarative Programming
作者: Bertolissi, Clara Fernández, Maribel Laboratoire d'Informatique Fondamentale Université Aix-Marseille 1 Marseille France King's College London Dept. of Computer Science London WC2R 2LS United Kingdom
In large, and often distributed, environments, where access control information may be shared across multiple sites, the combination of individual specifications in order to define a coherent access control policy is ... 详细信息
来源: 评论
New constructions for provably-secure time-bound hierarchical key assignment schemes
收藏 引用
thEORETICAL COMPUTER SCIENCE 2008年 第1-3期407卷 213-230页
作者: De Santis, Alfredo Ferrara, Anna Lisa Masucci, Barbara Univ Salerno Dipartimento Informat & Applicaz I-84084 Fisciano SA Italy
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the... 详细信息
来源: 评论
RCWLBAC - representing role based access control in OWL
RCWLBAC - representing role based access control in OWL
收藏 引用
13th acm symposium on access control models and technologies, SacmAT'08
作者: Finin, T. Joshi, A. Kagal, L. Niu, J. Sandhu, R. Winsborough, W. thuraisingham, B. Univ. of Maryland Baltimore United States Massachusetts Institute of Technology Univ. of Texas San Antonio United States Univ. of Texas Dallas
there have been two parallel themes in access control re-search in recent years. On the one hand there are efforts to develop new access control models to meet the policy needs of real world application domains. In pa... 详细信息
来源: 评论
Sudoku access: A Sudoku game for people with motor disabilities  08
Sudoku access: A Sudoku game for people with motor disabilit...
收藏 引用
10th International acm SIGaccess Conference on Computers and accessibility, ASSETS'08
作者: Norte, Stéphane Lobo, Fernando G. DEEI-FCT University of Algarve Campus de Gambelas 8000-117 Faro Portugal
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer game. We have created a new Sudoku game... 详细信息
来源: 评论
PPDP'08 Proceedings of the 10th International acm SIGPLAN symposium on Principles and Practice of Declarative Programming
PPDP'08 Proceedings of the 10th International ACM SIGPLAN Sy...
收藏 引用
PPDP 2008: 10th International acm SIGPLAN symposium on Principles and Practice of Declarative Programming
the proceedings contain 25 papers. the topics discussed include: order-sorted dependency pairs;macros for context-free grammars;inferring precise polymorphic type dependencies in logic programs;a type system for safe ...
来源: 评论
Joint routing and power allocation for IDMA applied in multi-hop wireless networks
Joint routing and power allocation for IDMA applied in multi...
收藏 引用
2008 IEEE 10th International symposium on Spread Spectrum Techniques and Applications, ISSSTA2008
作者: Schoneich, Hendrik Dekorsy, Armin Qualcomm CDMA Technologies GmbH Nuremberg Germany
Efficiently transmitting data in wireless mesh networks requires an integrated routing, scheduling, and power control strategy. Extending previous work on fast distributed routing and power allocation in multi-hop wir... 详细信息
来源: 评论
How to make Discretionary access control secure against trojan horses
How to make Discretionary Access Control secure against troj...
收藏 引用
10th Workshop on Advances in Parallel and Distributed Computational models/22nd IEEE International Parallel and Distributed Processing symposium
作者: Li, Ninghui Purdue Univ CERIAS W Lafayette IN 47907 USA
Modern commercial of the shelf operating systems use Discretionary access control (DAC) to protect files and other operating system resources. According to the Trusted Computer System Evaluation Criteria (TCSEC) (ofte... 详细信息
来源: 评论
Countering phishing threats with trust-by-wire in packet-switched IP networks - A conceptual framework
Countering phishing threats with trust-by-wire in packet-swi...
收藏 引用
10th Workshop on Advances in Parallel and Distributed Computational models/22nd IEEE International Parallel and Distributed Processing symposium
作者: Kubisch, Stephan Widiger, Harald Danielis, Peter Schulz, Jens Timmermann, Dirk Bahls, thomas Duchow, Daniel Univ Rostock Inst Appl Microelect & Comp Engn D-18051 Rostock Germany Broadband Access Div Nokia Siemens Networks D-17489 Greifswald Germany
During the last years, the Internet has grown into a mass-medium for communication and information exchange. Millions of people are using the Internet for business and in social life. Users can be reached easily and c... 详细信息
来源: 评论