咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是301-310 订阅
排序:
Typing control Operators in the CPS Hierarchy  11
Typing Control Operators in the CPS Hierarchy
收藏 引用
13th International acm SIGPLAN symposium on Principles and Practice of Declarative Programming
作者: Biernacka, Malgorzata Biernacki, Dariusz Lenglet, Serguei Univ Wroclaw Inst Comp Sci PL-50138 Wroclaw Poland
the CPS hierarchy of Danvy and Filinski is a hierarchy of continuations that allows for expressing nested control effects characteristic of, e.g., non-deterministic programming or certain instances of normalization by... 详细信息
来源: 评论
SacmAT'10 - Proceedings of the 15th acm symposium on access control models and technologies
SACMAT'10 - Proceedings of the 15th ACM Symposium on Access ...
收藏 引用
15th acm symposium on access control models and technologies, SacmAT 2010
the proceedings contain 19 papers. the topics discussed include: a model of triangulating environments for policy authoring;towards analyzing complex operating system access control configurations;monitoring security ...
来源: 评论
Proceedings - 2011 IEEE 13th International symposium on High-Assurance Systems Engineering, HASE 2011
Proceedings - 2011 IEEE 13th International Symposium on High...
收藏 引用
13th IEEE International symposium on High Assurance Systems Engineering, HASE 2011
the proceedings contain 57 papers. the topics discussed include: supporting iterative development of robust operation contracts in UML requirements models;improve the effectiveness of test case generation on EFSM via ...
来源: 评论
Analyzing transport and MAC layer in system-level performance simulation
Analyzing transport and MAC layer in system-level performanc...
收藏 引用
13th International symposium on System-on-Chip, SoC 2011
作者: Khan, Subayal Saastamoinen, Jukka Majanen, Mikko Huusko, Jyrki Nurmi, Jari VTT Technical Research Center of Finland FI-90570 Oulu Finland Tampere University of Technology Department of Computer Systems Korkeakoulunkatu 1 FIN-33101 Tampere Finland
the modern mobile embedded devices support complex distributed applications via heterogeneous multi-core platforms. For the successful deployment of these applications, the scalability and performance analysis must be... 详细信息
来源: 评论
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems
SecGuard: Secure and Practical Integrity Protection Model fo...
收藏 引用
13th Asia-Pacific Conference on Web Technology
作者: Zhai, Ennan Shen, Qingni Wang, Yonggang Yang, Tao Ding, Liping Qing, Sihan Peking Univ Sch Software & Microelect Shanghai Peoples R China Chinese Acad Sci Inst Software Beijing 100864 Peoples R China Peking Univ MoE Key Lab Network & Software Assurance Shanghai Peoples R China Peking Univ Inst Software Network & Informat Secur Lab Shanghai Peoples R China
Host compromise is a serious security problem for operating systems. Most previous solutions based on integrity protection models are difficult to use: on the other hand, usable integrity protection models can only pr... 详细信息
来源: 评论
access controls for Oblivious and Anonymous Systems
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 10-10页
作者: Coull, Scott E. Green, Matthew Hohenberger, Susan RedJack Silver Spring MD 20901 USA Johns Hopkins Univ Baltimore MD 21218 USA
the use of privacy-enhancing cryptographic protocols, such as anonymous credentials and oblivious transfer, could have a detrimental effect on the ability of providers to effectively implement access controls on their... 详细信息
来源: 评论
Authorization Recycling in Hierarchical RBAC Systems
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 3-3页
作者: Wei, Qiang Crampton, Jason Beznosov, Konstantin Ripeanu, Matei CCB Int Holdings Ltd Hong Kong Hong Kong Peoples R China Univ London Dept Math Egham TW20 0EX Surrey England Univ British Columbia Dept Elect & Comp Engn Vancouver BC V6T 1Z4 Canada
As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a singl... 详细信息
来源: 评论
Practical and Efficient Cryptographic Enforcement of Interval-Based access control Policies
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 14-14页
作者: Crampton, Jason Univ London Dept Math Informat Secur Grp Egham TW20 0EX Surrey England
the enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area h... 详细信息
来源: 评论
Session details: Data flow and access control  11
Session details: Data flow and access control
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Elisa Bertino Purdue University
No abstract available.
来源: 评论
Usable access control for all  11
Usable access control for all
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Robert W. Reeder Microsoft Redmond WA USA
No abstract available.
来源: 评论