咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是261-270 订阅
排序:
Policy-by-example for online social networks  12
Policy-by-example for online social networks
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Cheek, Gorrell P. Shehab, Mohamed College of Computing and Informatics University of North Carolina at Charlotte Charlotte NC 28223 United States
We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group ... 详细信息
来源: 评论
Fine-grained access control of personal data  12
Fine-grained access control of personal data
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Wang, Ting Srivatsa, Mudhakar Liu, Ling IBM Research United States Georgia Tech United States
the immensity and variety of personal information (e.g., profile, photo, and microblog) on social sites require access control policies tailored to individuals' privacy needs. Today such policies are still mainly ... 详细信息
来源: 评论
access control for RDF graphs using abstract models  12
Access control for RDF graphs using abstract models
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Papakonstantinou, Vassilis Michou, Maria Fundulaki, Irini Flouris, Giorgos Antoniou, Grigoris FORTH-ICS Greece University of Crete Greece University of Huddersfield United Kingdom
the Resource Description Framework (RDF) has become the defacto standard for representing information in the Semantic Web. Given the increasing amount of sensitive RDF data available on the Web, it becomes increasingl... 详细信息
来源: 评论
Generative models for access control policies: Applications to role mining over logs with attribution  12
Generative models for access control policies: Applications ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Molloy, Ian Park, Youngja Chari, Suresh IBM Research TJ Watson Hawthorne NY United States
We consider a fundamentally new approach to role and policy mining: finding RBAC models which reflect the observed usage of entitlements and the attributes of users. Such policies are interpretable, i.e., there is a n... 详细信息
来源: 评论
A framework integrating attribute-based policies into role-based access control  12
A framework integrating attribute-based policies into role-b...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Huang, Jingwei Nicol, David M. Bobba, Rakesh Huh, Jun Ho Information Trust Institute University of Illinois at Urbana-Champaign 1308 W. Main St. Urbana IL 61801 United States
Integrated role-based access control (RBAC) and attribute-based access control (ABAC) is emerging as a promising paradigm. this paper proposes a framework that uses attribute based policies to create a more traditiona... 详细信息
来源: 评论
xaccess: A Unified User-Centric access control Framework for Web Applications
xAccess: A Unified User-Centric Access Control Framework for...
收藏 引用
13th IEEE/IFIP Network Operations and Management symposium
作者: Singh, Kapil IBM T.J. Watson Research Center United States
With the rapid growth of Web 2.0, users are contributing more and more content on the Internet, in the form of user profiles, blogs, reviews, etc. With this increased sharing comes a pressing need for access control p... 详细信息
来源: 评论
SacmAT'11 - Proceedings of the 16th acm symposium on access control models and technologies
SACMAT'11 - Proceedings of the 16th ACM Symposium on Access ...
收藏 引用
16th acm symposium on access control models and technologies, SacmAT 2011
the proceedings contain 22 papers. the topics discussed include: a decade of model-driven security;deriving role engineering artifacts from business processes and scenario models;an integrated approach for identity an...
来源: 评论
Performance analysis of underwater acoustic random access networks
Performance analysis of underwater acoustic random access ne...
收藏 引用
2012 13th International symposium on Problems of Redundancy in Information and control Systems, RED 2012
作者: Stefanov, Andrej Stojanovic, Milica Information Technology Department IBU Skopje Macedonia Electrical and Computer Engineering Department Northeastern University Boston MA United States
We analyze the performance of underwater acoustic random access networks. the assumption is that the nodes are distributed in the plane according to a two dimensional Poisson point process. this is a suitable model fo... 详细信息
来源: 评论
On the performance of access control policy evaluation
On the performance of access control policy evaluation
收藏 引用
2012 IEEE 13th International symposium on Policies for Distributed Systems and Networks, POLICY 2012
作者: Griffin, Leigh Butler, Bernard De Leastar, Eamonn Jennings, Brendan Botvich, Dmitri Telecommunications Software and Systems Group Waterford Institute of Technology Waterford Ireland
there is growing awareness of the need to protect digital resources and services in both corporate and home ICT scenarios. Meanwhile, communication tools tailored for corporations are blurring the line between communi... 详细信息
来源: 评论
Session details: access control policies  12
Session details: Access control policies
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: James Joshi University of Pittsburgh
No abstract available.
来源: 评论