咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是241-250 订阅
排序:
SecureGov: Secure data sharing for government services  13
SecureGov: Secure data sharing for government services
收藏 引用
14th Annual International Digital Government Research Conference: From E-Government to Smart Government, dg.o 2013
作者: Choi, John Chun, Soon Ae Kim, Dong Hwa Keromytis, Angelos Division of Computer Software Sangmyung University Seoul Korea Republic of Columbia University City Univ. of New York Staten Island NY United States MarkAny Ssanglim Bldg 10F 151-11 Ssanglim-dong Seoul Korea Republic of Columbia University 1214 Amsterdam Avenue New York NY 10027 United States
Open Government initiative allows government data available digitally to share and integrate to produce value added information products and citizen services. this "paperless" government facilitates the tran... 详细信息
来源: 评论
Software tool for assessing secondary system opportunities in spectrum whitespaces
Software tool for assessing secondary system opportunities i...
收藏 引用
IEEE International symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM)
作者: Andreas Achtzehn Ljiljana Simić Marina Petrova Petri Mähönen Valentin Rakovic Pero Latkoski Liljana Gavrilovska Institute for Networked Systems RWTH Aachen University Aachen Germany Faculty of Electrical Engineering and Information Technologies Ss. Cyril and Methodius University in Skopje Skopje Macedonia
the prospect of increasing wireless capacity via secondary access to spatio-temporally underutilized chunks of spectrum, so-called whitespaces, has been proposed as a central aspect of emerging radio systems in respon... 详细信息
来源: 评论
Enhanced Multi-Domain access control for Secure Mobile Collaboration through Linked Data Cloud In Manufacturing
Enhanced Multi-Domain Access Control for Secure Mobile Colla...
收藏 引用
IEEE International symposium on a World of Wireless, Mobile and Multimedia Networks
作者: Patricia Ortiz Oscar Lázaro Mikel Uriarte Manuel Carnerero R&D ICT Unit Innovalia Association S.A. Bilbao Spain R&D Nextel S.A. Bilbao Spain
Collaborative networked organizations represent an important paradigm to help manufacturing companies to cope with the challenges of market turbulence. However, although manufacturing companies are increasingly aiming... 详细信息
来源: 评论
Towards a policy enforcement infrastructure for distributed usage control  12
Towards a policy enforcement infrastructure for distributed ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Kelbert, Florian Pretschner, Alexander Karlsruhe Institute of Technology Am Fasanengarten 5 Karlsruhe Germany
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an applica... 详细信息
来源: 评论
Encryption-enforced access control for an RFID Discovery Service  12
Encryption-enforced access control for an RFID Discovery Ser...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Kerschbaum, Florian Chaves, Leonardo Weiss Ferreira Department of Privacy and Data Security Technical University Dresden Germany SAP AG SAP Research Center Karlsruhe Germany
In this demonstration we present a novel encryption scheme for enforcing access control in a Discovery Service. A Discovery Service is a piece of software that allows one to "discover" item-level data which ... 详细信息
来源: 评论
A model-based approach to automated testing of access control policies  12
A model-based approach to automated testing of access contro...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Xu, Dianxiang thomas, Lijo Kent, Michael Mouelhi, Tejeddine Le Traon, Yves National Center for the Protection of the Financial Infrastructure Dakota State University Madison SD 57042 United States Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg Campus Kirchberg L-1359 Luxembourg
access control policies in software systems can be implemented incorrectly for various reasons. this paper presents a model-based approach for automated testing of access control implementation. To feed the model-base... 详细信息
来源: 评论
Automated Verification of Role-based access control Security models Recovered from Dynamic Web Applications
Automated Verification of Role-based Access Control Security...
收藏 引用
14th IEEE International symposium on Web Systems Evolution (WSE)
作者: Alalfi, Manar H. Cordy, James R. Dean, thomas R. Queens Univ Sch Comp Kingston ON Canada
this paper presents an original Model-Driven-Engineering (MDE) approach to support the verification and testing of security properties in dynamic web applications. Based on a previously recovered UML-based fine-graine... 详细信息
来源: 评论
SCUTA: A server-side access control system for web applications  12
SCUTA: A server-side access control system for web applicati...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Tan, Xi Du, Wenliang Luo, Tongbo Soundararaj, Karthick D. Dept. of Electrical Engineering and Computer Science Syracuse University Syracuse NY United States
the Web is playing a very important role in our lives, and is becoming an essential element of the computing infrastructure. Unfortunately, its importance makes it the preferred target of attacks. Web-based vulnerabil... 详细信息
来源: 评论
Practical risk aggregation in RBAC models  12
Practical risk aggregation in RBAC models
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Chari, Suresh Lobo, Jorge Molloy, Ian IBM Research TJ Watson Hawthorne NY United States
this paper describes our system, built as part of a commercially available product, for inferring the risk in an RBAC policy model, i.e., the assignment of permissions to roles and roles to users. Our system implement... 详细信息
来源: 评论
PlexC: A policy language for exposure control  12
PlexC: A policy language for exposure control
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Le Gall, Yann Lee, Adam J. Kapadia, Apu Department of Computer Science University of Pittsburgh Pittsburgh PA United States School of Informatics and Computing Indiana University Bloomington Bloomington IN United States
With the widespread use of online social networks and mobile devices, it is not uncommon for people to continuously broadcast contextual information such as their current location or activity. these technologies prese... 详细信息
来源: 评论