咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是281-290 订阅
排序:
Detecting and Resolving Policy Misconfigurations in access-control Systems  08
Detecting and Resolving Policy Misconfigurations in Access-C...
收藏 引用
13th acm symposium on access control models and technologies
作者: Bauer, Lujo Garriss, Scott Reiter, Michael K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Google Mountain View CA 94043 USA Univ N Carolina Dept Comp Sci Chapel Hill NC 27599 USA
access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration, and, in the context of particular applications (e. g., health care), very severe conseq... 详细信息
来源: 评论
Relationship-based access control policies and their policy languages  11
Relationship-based access control policies and their policy ...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Fong, Philip W.L. Siahaan, Ida Department of Computer Science University of Calgary Calgary AL Canada
the Relationship-Based access control (ReBAC) model was recently proposed as a general-purpose access control model. It supports the natural expression of parameterized roles, the composition of policies, and the dele... 详细信息
来源: 评论
Anomaly discovery and resolution in Web access control policies  11
Anomaly discovery and resolution in Web access control polic...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Hu, Hongxin Ahn, Gail-Joon Kulkarni, Ketan Arizona State University Tempe AZ 85287 United States
the advent of emerging technologies such asWeb services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from un... 详细信息
来源: 评论
Program synthesis in administration of higher-order permissions  11
Program synthesis in administration of higher-order permissi...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Bruns, Glenn Huth, Michael Avijit, Kumar Bell Labs Alcatel-Lucent United States Imperial College London United Kingdom Carnegie Mellon University United States
In "administrative" access control, policy controls permissions not just on application actions, but also on actions to modify permissions, on actions to modify permissions on those actions, and so on. One c... 详细信息
来源: 评论
xDAuth: A scalable and lightweight framework for cross domain access control and delegation  11
xDAuth: A scalable and lightweight framework for cross domai...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Alam, Masoom Zhang, Xinwen Khan, Kamran H Ali, Gohar Security Engineering Research Group IMSciences United States Huawei America Research Center Santa Clara CA United States
Cross domain resource sharing and collaborations have be- come pervasive in today's service oriented organizations. Existing approaches for the realization of cross domain access control are either focused on the ... 详细信息
来源: 评论
An authorization scheme for version control systems  11
An authorization scheme for version control systems
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Chamarty, Sitaram Patel, Hiren D. Tripunitara, Mahesh V. Tata Consultancy Services Hyderabad India ECE Department Univ. of Waterloo Canada
We present gitolite, an authorization scheme for Version control Systems (VCSes). We have implemented it for the Git VCS. A VCS enables versioning, distributed collaboration and several other features, and is an impor... 详细信息
来源: 评论
access controls for Oblivious and Anonymous Systems
Access Controls for Oblivious and Anonymous Systems
收藏 引用
13th acm symposium on access control models and technologies
作者: Coull, Scott E. Green, Matthew Hohenberger, Susan RedJack Silver Spring MD 20901 USA Johns Hopkins Univ Baltimore MD 21218 USA
the use of privacy-enhancing cryptographic protocols, such as anonymous credentials and oblivious transfer, could have a detrimental effect on the ability of providers to effectively implement access controls on their... 详细信息
来源: 评论
Rumpole: A flexible break-glass access control model  11
Rumpole: A flexible break-glass access control model
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Marinovic, Srdjan Craven, Robert Ma, Jiefei Dulay, Naranker Department of Computing Imperial College London United Kingdom
access control operates under the assumption that it is possible to correctly encode and predict all subjects' needs and rights. However, in human-centric pervasive domains, such as health care, it is hard if not ... 详细信息
来源: 评论
Detecting and Resolving Policy Misconfigurations in access-control Systems
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2011年 第1期14卷 1–28页
作者: Bauer, Lujo Garriss, Scott Reiter, Michael K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Google Mountain View CA 94043 USA Univ N Carolina Dept Comp Sci Chapel Hill NC 27599 USA
access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration, and, in the context of particular applications (e. g., health care), very severe conseq... 详细信息
来源: 评论
System for automatic estimation of data sensitivity with applications to access control and other applications  11
System for automatic estimation of data sensitivity with app...
收藏 引用
Proceedings of the 16th acm symposium on access control models and technologies
作者: Park, Youngja Gates, Stephen C. Teiken, Wilfried Chari, Suresh N. IBM T. J. Watson Research Center P.O. Box 704 Yorktown Heights NY 10598 United States
the Enterprise Information Security Management (EISM) system aims to semi-automatically estimate the sensitivity of enterprise data through advanced content analysis and business process mining. We demonstrate a proof... 详细信息
来源: 评论