咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 470 篇 英文
  • 11 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是291-300 订阅
排序:
Anomaly discovery and resolution in Web access control policies  11
Anomaly discovery and resolution in Web access control polic...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Hu, Hongxin Ahn, Gail-Joon Kulkarni, Ketan Arizona State University Tempe AZ 85287 United States
the advent of emerging technologies such asWeb services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from un... 详细信息
来源: 评论
Program synthesis in administration of higher-order permissions  11
Program synthesis in administration of higher-order permissi...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Bruns, Glenn Huth, Michael Avijit, Kumar Bell Labs Alcatel-Lucent United States Imperial College London United Kingdom Carnegie Mellon University United States
In "administrative" access control, policy controls permissions not just on application actions, but also on actions to modify permissions, on actions to modify permissions on those actions, and so on. One c... 详细信息
来源: 评论
xDAuth: A scalable and lightweight framework for cross domain access control and delegation  11
xDAuth: A scalable and lightweight framework for cross domai...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Alam, Masoom Zhang, Xinwen Khan, Kamran H Ali, Gohar Security Engineering Research Group IMSciences United States Huawei America Research Center Santa Clara CA United States
Cross domain resource sharing and collaborations have be- come pervasive in today's service oriented organizations. Existing approaches for the realization of cross domain access control are either focused on the ... 详细信息
来源: 评论
An authorization scheme for version control systems  11
An authorization scheme for version control systems
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Chamarty, Sitaram Patel, Hiren D. Tripunitara, Mahesh V. Tata Consultancy Services Hyderabad India ECE Department Univ. of Waterloo Canada
We present gitolite, an authorization scheme for Version control Systems (VCSes). We have implemented it for the Git VCS. A VCS enables versioning, distributed collaboration and several other features, and is an impor... 详细信息
来源: 评论
Fine-grained integration of access control policies
收藏 引用
COMPUTERS & SECURITY 2011年 第2-3期30卷 91-107页
作者: Rao, Prathima Lin, Dan Bertino, Elisa Li, Ninghui Lobo, Jorge Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA Missouri Univ Sci & Technol Dept Comp Sci Rolla MO USA IBM TJ Watson Res Ctr Yorktown Hts NY USA
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to su... 详细信息
来源: 评论
Rumpole: A flexible break-glass access control model  11
Rumpole: A flexible break-glass access control model
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Marinovic, Srdjan Craven, Robert Ma, Jiefei Dulay, Naranker Department of Computing Imperial College London United Kingdom
access control operates under the assumption that it is possible to correctly encode and predict all subjects' needs and rights. However, in human-centric pervasive domains, such as health care, it is hard if not ... 详细信息
来源: 评论
System for automatic estimation of data sensitivity with applications to access control and other applications  11
System for automatic estimation of data sensitivity with app...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Park, Youngja Gates, Stephen C. Teiken, Wilfried Chari, Suresh N. IBM T. J. Watson Research Center P.O. Box 704 Yorktown Heights NY 10598 United States
the Enterprise Information Security Management (EISM) system aims to semi-automatically estimate the sensitivity of enterprise data through advanced content analysis and business process mining. We demonstrate a proof... 详细信息
来源: 评论
An approach to modular and testable security models of real-world health-care applications  11
An approach to modular and testable security models of real-...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Brucker, Achim D. Brügger, Lukas Kearney, Paul Wolff, Burkhart SAP Research Vincenz-Priessnitz-Str. 1 76131 Karlsruhe Germany Information Security ETH Zurich 8092 Zurich Switzerland Security Futures Practice BT Innovate and Design Adastral Park Ipswich United Kingdom Parc Club Orsay Universit´ Université Paris-Sud 91893 Orsay Cedex France
We present a generic modular policy modelling framework and instantiate it with a substantial case study for modelbased testing of some key security mechanisms of applications and services of the NPfIT. NPfIT, the Nat... 详细信息
来源: 评论
Modeling data flow in socio-information networks: A risk estimation approach  11
Modeling data flow in socio-information networks: A risk est...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Wang, Ting Srivatsa, Mudhakar Agrawal, Dakshi Liu, Ling College of Computing Georgia Institute of Technology Atlanta GA United States IBM T.J. Watson Research Center Hawthorne NY United States
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) - some of whom may be controlled by malicious insiders - often leads to unpredicted access control risk... 详细信息
来源: 评论
Data leakage mitigation for discretionary access control in collaboration clouds  11
Data leakage mitigation for discretionary access control in ...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Wang, Qihua Jin, Hongxia IBM Almaden Research Center San Jose CA United States
With the growing popularity of cloud computing, more and more enterprises are migrating their collaboration platforms from inenterprise systems to Software as a Service (SaaS) applications. While SaaS collaboration ha... 详细信息
来源: 评论