咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是431-440 订阅
排序:
AC-XML documents: Improving the performance of a web access control module  05
AC-XML documents: Improving the performance of a web access ...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Carminati, Barbara Ferrari, Elena University of Insubria at Como Via Valleggio 11 Como Italy
Protecting information over the web is today becoming a primary need. Although many access control models have been so far proposed to address the specific protection requirements of the web environment, no comparable... 详细信息
来源: 评论
Adaptive trust negotiation and access control  05
Adaptive trust negotiation and access control
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Ryutov, Tatyana Zhou, Li Neuman, Clifford Leithead, Travis Seamons, Kent E. Information Sciences Institute University of Southern California Marina del Rey CA 90292-6695 Internet Security Research Lab. Brigham Young University Provo UT 84602-6576
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-control environment for such transaction... 详细信息
来源: 评论
A reference monitor for workflow systems with constrained task execution  05
A reference monitor for workflow systems with constrained ta...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Crampton, Jason Information Security Group Royal Holloway University of London
We describe a model, independent of any underlying access control paradigm, for specifying authorization constraints such as separation of duty and cardinality constraints in workflow systems. We present a number of r... 详细信息
来源: 评论
Context sensitive access control  05
Context sensitive access control
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Hulsebosch, R.J. Salden, A.M. Bargh, M.S. Ebben, P.W.G. Reitsma, J. Telematica Instituut P.O. Box 589 7500 AN Enschede Netherlands
We investigate the practical feasibility of using context information for controlling access to services. Based solely on situational context, we show that users can be transparently provided anonymous access to servi... 详细信息
来源: 评论
Rule support for role-based access control  05
Rule support for role-based access control
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Kern, Axel Walhorn, Claudia Beta Systems Software AG Josef-Lammerting-Allee 14 50933 Köln Germany
the administration of users and access rights in large enterprises is a complex and challenging task. Role-based access control (RBAC) is a powerful concept for simplifying access control. In particular. Enterprise Ro... 详细信息
来源: 评论
Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure  05
Declaration and enforcement of fine-grained access restricti...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Matheus, Andreas Fakultät für Informatik Technische Universität München Boltzmannstr. 3 D-85748 Garching
this work describes the declaration and enforcement of geospatial access restrictions for the infrastructure of heterogenous and distributed geospatial information objects, as they are accessible via the service-orien... 详细信息
来源: 评论
Relevancy based access control of versioned XML documents  05
Relevancy based access control of versioned XML documents
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Iwaihara, Mizuho Chatvichienchai, Somchai Anutariya, Chutiporn Wuwongse, Vilas Dept. Social Informatics Kyoto University Kyoto 606-8501 Japan Dept. Info.-Media Siebold University of Nagasaki Nagasaki 851-2195 Japan Computer Science Program Shinawatra University Pathumthani 12160 Thailand Computer Science and Information Management Program Asian Institute of Technology Pathumthani 12120 Thailand
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependenci... 详细信息
来源: 评论
Purpose based access control of complex data for privacy protection  05
Purpose based access control of complex data for privacy pro...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Byun, Ji-Won Bertino, Elisa Li, Ninghui CERIAS Department of Computer Sciences Purdue University 656 Oval Drive West Lafayette IN 47907
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development, of privacy protecting technology. We recently proposed a privacy preserving access con... 详细信息
来源: 评论
A fine-grained, controllable, user-to-user delegation method in RBAC  05
A fine-grained, controllable, user-to-user delegation method...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Wainer, Jacques Kumar, Akhil Institute of Computing State University of Campinas Campinas Brazil Smeal College of Business Penn State University University Park PA United States
this paper addresses the issues surrounding user-to-user delegation in RBAC. We show how delegations can be incorporated into the RBAC model in a simple and straightforward manner. A special feature of the model is th... 详细信息
来源: 评论
Role mining with ORCA  05
Role mining with ORCA
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Schlegelmilch, Jürgen Steffens, Ulrike OFFIS e.V. Escherweg 2 26121 Oldenburg Germany
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, security demands a tight regime on permissi... 详细信息
来源: 评论