咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是231-240 订阅
排序:
Sticky policies for mobile devices  13
Sticky policies for mobile devices
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Di Cerbo, Francesco Trabelsi, Slim Steingruber, thomas Dodero, Gabriella Bezzi, Michele Applied Research Security and Trust SAP Labs France 805 av. Donat 06250 Mougins France Free University of Bozen-Bolzano Piazza Universitá 1 39100 Bolzano-Bozen Italy
Mobile devices consume significant amounts of information, from different sources. thus they often deal also with sensitive or confidential data, in places or situations that could be not appropriate, or not compliant... 详细信息
来源: 评论
Enabling intensional access control via preference-aware query optimization  13
Enabling intensional access control via preference-aware que...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Farnan, Nicholas L. Lee, Adam J. Chrysanthis, Panos K. Yu, Ting Department of Computer Science University of Pittsburgh Pittsburgh PA United States Department of Computer Science North Carolina State University Raleigh NC United States
Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evalua... 详细信息
来源: 评论
Content-based information protection and release in NATO operations  13
Content-based information protection and release in NATO ope...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Armando, Alessandro Grasso, Matteo Oudkerk, Sander Ranise, Silvio Wrona, Konrad DIBRIS U. of Genova Italy Security and Trust Unit FBK-Irst Trento Italy Agent Sierra Consultancy Services Amsterdam Netherlands NATO Communications and Information Agency The Hague Netherlands
the successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted u... 详细信息
来源: 评论
Beyond accountability: Using obligations to reduce risk exposure and deter insider attacks  13
Beyond accountability: Using obligations to reduce risk expo...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Baracaldo, Nathalie Joshi, James University of Pittsburgh School of Information Sciences United States
Recently, the importance of including obligations as part of access control systems for privilege management, for example, in healthcare information systems, has been well recognized. In an access control system, an a... 详细信息
来源: 评论
SacmAT'12 - Proceedings of the 17th acm symposium on access control models and technologies
SACMAT'12 - Proceedings of the 17th ACM Symposium on Access ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
the proceedings contain 27 papers. the topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for access control policies: applications to role mining over logs wi...
来源: 评论
On the notion of redundancy in access control policies  13
On the notion of redundancy in access control policies
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Guarnieri, Marco Neri, Mario Arrigoni Magri, Eros Mutti, Simone Institute of Information Security ETH Zürich Switzerland Università degli Studi Bergamo Italy Comelit R and D Comelit Group S.p.A Italy
the evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may incr... 详细信息
来源: 评论
HyXAC: A hybrid approach for XML access control  13
HyXAC: A hybrid approach for XML access control
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: thimma, Manogna Tsui, Tsam Kai Luo, Bo Cerner Corporation Kansas City MO United States NIPR Kansas City MO United States EECS University of Kansas Lawrence KS United States
While XML has been widely adopted for information sharing over the Internet, the need for efficient XML access control naturally arise. Various XML access control enforcement mechanisms have been proposed in the resea... 详细信息
来源: 评论
SacmAT'08 - Proceedings of the 13th acm symposium on access control models and technologies
SACMAT'08 - Proceedings of the 13th ACM Symposium on Access ...
收藏 引用
13th acm symposium on access control models and technologies, SacmAT'08
the proceedings contain 20 papers. the topics discussed include: fast exact and heuristic methods for role minimization problems;migrating to optimal RBAC with minimal perturbation;mining roles with semantic meanings;...
来源: 评论
Permission path analysis based on access intelligence  13
Permission path analysis based on access intelligence
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Sturm, Detlef Kern, Axel Beta Systems Software AG Alt-Moabit 90d D-10559 Berlin Germany Beta Systems Software AG Josef-Lammertings-Allee 14 D-50933 Köln Germany
the current Idintity and access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented access Governance. IdM focuses more on providing a single point of administration a... 详细信息
来源: 评论
Information flow control for stream processing in clouds  13
Information flow control for stream processing in clouds
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Xie, Xing Ray, Indrakshi Adaikkalavan, Raman Gamble, Rose Computer Science Department Colorado State University Fort Collins CO 80523 United States Computer and Information Sciences Indiana University South Bend South Bend IN 46634 United States Tandy School of Computer Science University of Tulsa Tulsa OK 74104 United States
In the near future, clouds will provide situational monitoring services using streaming data. Examples of such services include health monitoring, stock market monitoring, shopping cart monitoring, and emergency contr... 详细信息
来源: 评论