咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是261-270 订阅
排序:
SacmAT'11 - Proceedings of the 16th acm symposium on access control models and technologies
SACMAT'11 - Proceedings of the 16th ACM Symposium on Access ...
收藏 引用
16th acm symposium on access control models and technologies, SacmAT 2011
the proceedings contain 22 papers. the topics discussed include: a decade of model-driven security;deriving role engineering artifacts from business processes and scenario models;an integrated approach for identity an...
来源: 评论
Proceedings - 14th International symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2012
Proceedings - 14th International Symposium on Symbolic and N...
收藏 引用
14th International symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2012
the proceedings contain 71 papers. the topics discussed include: enabling distributed intelligent systems in open environments through agreement technologies;interactive vs. automated proofs in computational origami;s...
来源: 评论
A linear concurrent constraint approach for the automatic verification of access permissions  12
A linear concurrent constraint approach for the automatic ve...
收藏 引用
14th symposium on Principles and Practice of Declarative Programming, PPDP 2012
作者: Olarte, Carlos Rueda, Camilo Pimentel, Elaine Cataño, Néstor Dept. de Electrónica y Ciencias de la Computación Pontificia Universidad Javeriana-Cali Colombia Universidad del Valle Colombia Universidade Federal de Minas Gerais Brazil University of Madeira Portugal
A recent trend in object oriented programming languages is the use access Permissions (AP) as abstraction to control concurrent executions. AP define a protocol specifying how different references can access the mutab... 详细信息
来源: 评论
Proceedings - 14th IEEE International symposium on Web Systems Evolution, WSE 2012
Proceedings - 14th IEEE International Symposium on Web Syste...
收藏 引用
14th IEEE International symposium on Web Systems Evolution, WSE 2012
the proceedings contain 15 papers. the topics discussed include: automated verification of role-based access control security models recovered from dynamic web applications;visual testing of graphical user interfaces:...
来源: 评论
Challenges in 3D reconstruction from images for difficult large-scale objects: A study on the modeling of electrical substations
Challenges in 3D reconstruction from images for difficult la...
收藏 引用
2012 14th symposium on Virtual and Augmented Reality, SVR 2012
作者: Simões, Francisco Almeida, Mozart Pinheiro, Mariana Anjos, Ronaldo Dos Santos, Artur Dos Roberto, Rafael Teichrieb, Veronica Suetsugo, Clarice Pelinson, Alexandre Voxar Labs. Informatics Center Federal University of Pernambuco Recife Brazil Eletrobras Furnas Rio de Janeiro Brazil
In recent years, 3D reconstruction from images has played a major role in computer vision with a lot of improvements regarding both quality and performance. One of its main uses is the generation of 3D models of objec... 详细信息
来源: 评论
A concept of web-based energy data quality assurance and control system
A concept of web-based energy data quality assurance and con...
收藏 引用
14th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2012
作者: Tyukov, Anton Brebels, Adriaan Shcherbakov, Maxim Kamaev, Valeriy Volgograd State Technical University 28 Lenina avenue Volgograd Russia Hogeschool Thomas More Kleinhoefstraat 4 Geel Belgium
Development both of sensor and data communication technologies made a serious impact in development of SCADA systems in various domains. Possibility of access to sensor data in real time mode changed methods of monito... 详细信息
来源: 评论
Session details: access control policies  12
Session details: Access control policies
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: James Joshi University of Pittsburgh
No abstract available.
来源: 评论
Session details: access control applications  12
Session details: Access control applications
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: Elisa Bertino Purdue University
No abstract available.
来源: 评论
Session details: access control for mobile devices and social networks  12
Session details: Access control for mobile devices and socia...
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: Ian Molloy IBM Research
No abstract available.
来源: 评论
Session details: Role-based access control  12
Session details: Role-based access control
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: Axel Kern Beta Systems Software AG
No abstract available.
来源: 评论