咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是381-390 订阅
排序:
SacmAT'07: Proceedings of the 12th acm symposium on access control models and technologies
SACMAT'07: Proceedings of the 12th ACM Symposium on Access C...
收藏 引用
SacmAT'07: 12th acm symposium on access control models and technologies
the proceedings contain 28 papers. the topics discussed include: An approach to evaluate policy similarity;a posteriori compliance control;enforcing access control over data streams;fine-grained access control to web ... 详细信息
来源: 评论
ROWLBAC: representing role based access control in OWL  08
ROWLBAC: representing role based access control in OWL
收藏 引用
Proceedings of the 13th acm symposium on access control models and technologies
作者: T. Finin A. Joshi L. Kagal J. Niu R. Sandhu W. Winsborough B. thuraisingham Univ. of Maryland Massachusetts Institute of Technology Univ. of Texas at San Antonio Univ. of Texas Dallas
there have been two parallel themes in access control research in recent years. On the one hand there are efforts to develop new access control models to meet the policy needs of real world application domains. In par... 详细信息
来源: 评论
Broadband demand and the role of new technologies
Broadband demand and the role of new technologies
收藏 引用
NETWORKS International Telecommunications Network Strategy and Planning symposium
作者: Kjell Stordahl Telenor Norway Snarøyvn 30 Fornebu N-1331 Norway
Huge investments have been used to roll out broadband networks during the recent years. Long-term broadband demand forecasts have been and are crucial for investments decisions, rollouts and dimensioning of the networ... 详细信息
来源: 评论
thermal analysis of 8-T SRAM for nano-scaled technologies
Thermal analysis of 8-T SRAM for nano-scaled technologies
收藏 引用
International symposium on Low Power Electronics and Design (ISLPED)
作者: Mesut Meterelliyoz Jaydeep P. Kulkarni Kaushik Roy School of Electrical and Computer Engineering Purdue University West Lafayette IN USA
Different sections of a cache memory may experience different temperature profiles depending on their proximity to other active logic units such as the execution unit. In this paper, we perform thermal analysis of cac... 详细信息
来源: 评论
A note on the formalisation of UCON  07
A note on the formalisation of UCON
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Janicke, Helge Cau, Antonio Zedan, Hussein De Montfort Univ Software Technol Res Lab Leicester LE1 9BH Leics England
Usage control (UCON) models, similar to access control models, control and govern the users' access to resources and services that, are available in the system. One of the major improvements of UCON over tradition... 详细信息
来源: 评论
Action-Status access control  07
Action-Status Access Control
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Barker, Steve Kings Coll London Strand London WC2A 2LS England
We introduce a generalization of Role-based access control that we call the Action-Status access control (ASAC) model. ASAC model addresses certain shortcomings with RBAC models when applied in distributed computing c... 详细信息
来源: 评论
Enforcing access control Over Data Streams  07
Enforcing Access Control Over Data Streams
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Carminati, Barbara Ferrari, Elena Tan, Kian Lee Univ Insubria DICOM Varese Italy
access control is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study ho... 详细信息
来源: 评论
Privacy-aware Role Based access control  07
Privacy-aware Role Based Access Control
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Ni, Qun Trombetta, Alberto Bertino, Elisa Lobo, Jorge Purdue Univ W Lafayette IN 47907 USA
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. therefore, the definition of all expressive and easy-to-use privacy-related access control model, based oil... 详细信息
来源: 评论
Discretionary access control with the Administrative Role Graph Model  07
Discretionary Access Control with the Administrative Role Gr...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Wang, He Osborn, Sylvia L. Univ Western Ontario Dept Comp Sci London ON N6A 5B7 Canada
Previous research examining the mapping of discretionary access control (DAC) to role-based access control (RBAC) has considered neither ownership nor further granting of privileges. We show how to accomplish this by ... 详细信息
来源: 评论
Fine-grained access control to Web Databases  07
Fine-grained Access Control to Web Databases
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Roichman, Alex Gudes, Ehud Open Univ Dept Comp Sci Raanana Israel
Before the Web era, databases were well-protected by using the standard access control techniques such as Views and SQL authorization commands. But with the development of web systems, the number of attacks oil databa... 详细信息
来源: 评论