咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是181-190 订阅
排序:
Automated inference of access control policies For web applications  15
Automated inference of access control policies For web appli...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Le, Ha thanh Nguyen, Cu D. Briand, Lionel Hourte, Benjamin University of Luxembourg Luxembourg Luxembourg HITEC Luxembourg S.A. LuxembourgL-1458 Luxembourg
In this paper, we present a novel, semi-automated approach to infer access control policies automatically for web-based applications. Our goal is to support the validation of implemented access control policies, even ... 详细信息
来源: 评论
Preventing information inference in access control  15
Preventing information inference in access control
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Paci, Federica Zannone, Nicola University of Southampton United Kingdom Eindhoven University of Technology Netherlands
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy conce... 详细信息
来源: 评论
Relationship-based access control for an open-source medical records system  15
Relationship-based access control for an open-source medical...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Rizvi, Syed Zain R. Fong, Philip W.L. Crampton, Jason Sellwood, James University of Calgary AB Canada Royal Holloway University of London Egham United Kingdom
Inspired by the access control models of social network systems, Relationship-Based access control (ReBAC) was recently proposed as a general-purpose access control paradigm for application domains in which authorizat... 详细信息
来源: 评论
Federated access management for collaborative network environments: Framework and case study  15
Federated access management for collaborative network enviro...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Rubio-Medrano, Carlos E. Zhao, Ziming Doupé, Adam Ahn, Gail-Joon Arizona State University TempeAZ United States
With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of being involved in inter-organizational, mul... 详细信息
来源: 评论
Mitigating access control vulnerabilities through interactive static analysis  15
Mitigating access control vulnerabilities through interactiv...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Zhu, Jun Chu, Bill Lipford, Heather thomas, Tyler University of North Carolina at Charlotte CharlotteNC28223 United States
access control vulnerabilities due to programming errors have consistently ranked amongst top software vulnerabilities. Previous research efforts have concentrated on using automatic program analysis techniques to det... 详细信息
来源: 评论
On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval  15
On missing attributes in access control: Non-deterministic a...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Crampton, Jason Morisset, Charles Zannone, Nicola Royal Holloway University of London United Kingdom Newcastle University United Kingdom Eindhoven University of Technology Netherlands
Attribute Based access control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are defined in terms of pairs attribute names... 详细信息
来源: 评论
Mohawk+T: Efficient analysis of administrative temporal role-based access control (ATRBAC) policies  15
Mohawk+T: Efficient analysis of administrative temporal role...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Shahen, Jonathan Niu, Jianwei Tripunitara, Mahesh University of Waterloo Canada University of Texas San Antonio United States
Safety analysis is recognized as a fundamental problem in access control. It has been studied for various access control schemes in the literature. Recent work has proposed an administrative model for Temporal Role-Ba... 详细信息
来源: 评论
Towards an automatic top-down role engineering approach using natural language processing techniques  15
Towards an automatic top-down role engineering approach usin...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Narouei, Masoud Takabi, Hassan Department of Computer Science and Engineering University of North Texas DentonTX United States
Role Based access control (RBAC) is the most widely used model for access control due to the ease of administration as well as economic benefits it provides. In order to deploy an RBAC system, one requires to first id... 详细信息
来源: 评论
A logic of trust for reasoning about delegation and revocation  15
A logic of trust for reasoning about delegation and revocati...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Cramer, Marcos Ambrossio, Diego Agustín Van Hertum, Pieter University of Luxembourg Luxembourg KU Leuven Belgium
In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. there are different ways to treat these delegation chains ... 详细信息
来源: 评论
Towards a general framework for optimal role mining: A constraint satisfaction approach  15
Towards a general framework for optimal role mining: A const...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Jafarian, Jafar Haadi Takabi, Hassan Touati, Hakim Hesamifard, Ehsan Shehab, Mohamed Department of Software and Information Systems University of North Carolina at Charlotte CharlotteNC United States Department of Computer Science and Engineering University of North Texas DentonTX United States
Role Based access control (RBAC) is the most widely used advanced access control model deployed in a variety of organizations. To deploy an RBAC system, one needs to first identify a complete set of roles, including p... 详细信息
来源: 评论