咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 470 篇 英文
  • 11 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是421-430 订阅
排序:
Role-based access management for ad-hoc collaborative sharing  06
Role-based access management for ad-hoc collaborative sharin...
收藏 引用
11th acm symposium on access control models and technologies, SacmAT 2006
作者: Jin, Jing Ahn, Gail-Joon University of North Carolina Charlotte United States
Under scientific collaborations, resource sharing tends to be highly dynamic and often ad hoc. the dynamic characteristics and sharing patterns of ad-hoc collaborative sharing impose a need for comprehensive and flexi... 详细信息
来源: 评论
Key management for non-tree access hierarchies  06
Key management for non-tree access hierarchies
收藏 引用
11th acm symposium on access control models and technologies, SacmAT 2006
作者: Atallah, Mikhail J. Blanton, Marina Frikken, Keith B. Department of Computer Science Purdue University United States
access hierarchies are useful in many applications and are modeled as a set of access classes organized by a partial order. A user who obtains access to a class in such a hierarchy is entitled to access objects stored... 详细信息
来源: 评论
Succinct representation of flexible and privacy-preserving access rights
收藏 引用
VLDB JOURNAL 2006年 第4期15卷 334-354页
作者: Blanton, Marina Atallah, Mikhail Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access control means that the service provider can neither... 详细信息
来源: 评论
Quorum placement in networks: Minimizing network congestion
Quorum placement in networks: Minimizing network congestion
收藏 引用
25th Annual acm symposium on Principles of Distributed Computing 2006
作者: Golovin, Daniel Gupta, Anupam Maggs, Bruce M. Oprea, Florian Reiter, Michael K. Computer Science Department Carnegie Mellon University Pittsburgh PA United States Electrical and Computer Engineering Department Carnegie Mellon University Pittsburgh PA United States Akamai Technologies Cambridge MA United States
A quorum system over a universe of logical elements is a collection of subsets (quorums) of elements, any two of which intersect. In numerous distributed algorithms, the elements of the universe reside on the nodes of... 详细信息
来源: 评论
Searchable symmetric encryption: Improved definitions and efficient constructions
Searchable symmetric encryption: Improved definitions and ef...
收藏 引用
CCS 2006: 13th acm Conference on Computer and Communications Security
作者: Curtmola, Reza Garay, Juan Kamara, Seny Ostrovsky, Rafail Department of Computer Science Johns Hopkins University Baltimore MD Bell Labs - Lucent Technologies Murray Hill NJ Department of Computer Science UCLA Los Angeles CA
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a private manner, while maintaining the ability to selectively search over it. this problem has ... 详细信息
来源: 评论
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
SACMAT 2005: Proceedings of 10th ACM Symposium on Access Con...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
the proceedings contain 19 papers. the topics discussed include: integrity constraints in trust management;declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastruc... 详细信息
来源: 评论
Proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
Proceedings of acm symposium on access control models and technologies, SacmAT 2005年 iii页
作者: Ferrari, Elena Ahn, Gail-Joon
No abstract available
来源: 评论
Future direction of access control models, architectures, and technologies  05
Future direction of access control models, architectures, an...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Beznosov, Konstantin University of British Columbia Canada
No abstract available
来源: 评论
Verifiable composition of access control and application features  05
Verifiable composition of access control and application fea...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Song, Eunjee Reddy, Raghu France, Robert Ray, Indrakshi Georg, Geri Alexander, Roger Computer Science Dept. Colorado State University Fort Collins CO 80523
access control features are often spread across and tangled with other functionality in a design. this makes modifying and replacing these features in a design difficult. Aspect-oriented modeling (AOM) techniques can ... 详细信息
来源: 评论
Peer-to-peer access control architecture using trusted computing technology  05
Peer-to-peer access control architecture using trusted compu...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Sandhu, Ravi Zhang, Xinwen George Mason University
It has been recognized for some lime that software alone does not provide an adequate foundation for building a high-assurance trusted platform. the emergence of industry-standard trusted computing technologies promis... 详细信息
来源: 评论