咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是331-340 订阅
排序:
An Optimistic Concurrency control Algorithm for Mobile Ad-hoc Network Databases  10
An Optimistic Concurrency Control Algorithm for Mobile Ad-ho...
收藏 引用
14th International Database Engineering and Applications symposium (IDEAS)
作者: Xing, Zhaowen Gruenwald, Le Song, Seokil Univ Oklahoma Sch Comp Sci Norman OK 73019 USA Chungju Natl Univ Dept Comp Engn Chungbuk 380702 South Korea
With the rapid growth of database applications, wireless networking technology and mobile computing devices, there is a demand for processing mobile transactions in Mobile Ad-hoc Network (MANET) databases, so that mob... 详细信息
来源: 评论
Proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
Proceedings of acm symposium on access control models and technologies, SacmAT 2009年 iii页
作者: Carminati, Barbara Joshi, James University of Insubria Italy University of Pittsburgh United States
来源: 评论
Efficient and privacy-preserving enforcement of attribute-based access control  10
Efficient and privacy-preserving enforcement of attribute-ba...
收藏 引用
9th symposium on Identity and Trust on the Internet, IDtrust 2010
作者: Shang, Ning Paci, Federica Bertino, Elisa Microsoft Corporation One Microsoft Way Redmond WA United States University of Trento Via Sommarive 14 Povo Trento 38123 Italy Purdue University 305 N. University Street West Lafayette IN United States
Modern access control models, developed for protecting data from accesses across the Internet, require to verify the identity of users in order to make sure that users have the required permissions for accessing the d... 详细信息
来源: 评论
Statistical impulse detection of in-vehicle power line noise using hidden Markov model
Statistical impulse detection of in-vehicle power line noise...
收藏 引用
14th Annual International symposium on Power Line Communications and its Applications, IEEE ISPLC 2010
作者: Umehara, Daisuke Morikura, Masahiro Hisada, Toshiya Ishiko, Shinichi Horihata, Satoshi Graduate School of Informatics Kyoto University Yoshida-honmachi Sakyo-ku Kyoto 606-8501 Japan Sumitomo Electric Industries Ltd. 1-1-3 Shimaya Konohana-ku Osaka 554-0024 Japan AutoNetworks Technologies Ltd. 1-1-3 Shimaya Konohana-ku Osaka 554-0024 Japan
control signal networks in vehicles using dedicated communication cables such as twisted wires and fiber optics cables have been built in order to communicate between electronic control units (ECUs). However, there ar... 详细信息
来源: 评论
COSTA: A model to analyze next generation broadband access platform competition
COSTA: A model to analyze next generation broadband access p...
收藏 引用
NETWORKS International Telecommunications Network Strategy and Planning symposium
作者: Arturo Vergara Antolín Moral Jorge Pérez Grupo de Tecnologías de la Información y las Comunicaciones Universidad Politécnica de Madrid (UPM) Madrid Spain
the roll-out of next generation access networks is a complex process which depends not only on technical or commercial factors, but also on market conditions and regulatory decisions. the path adopted by the different... 详细信息
来源: 评论
New access models for healthcare  10
New access models for healthcare
收藏 引用
Proceedings of the 15th acm symposium on access control models and technologies
作者: Tyrone Grandison Healthcare Transformation IBM Services Research Hawthorne NY USA
Currently, there is a convergence of three key factors in the global landscape that creates an opportunity for the research community to make fundamental contributions to improving the quality of life of every single ... 详细信息
来源: 评论
Spatio-temporal access control: Challenges and Applications
Spatio-temporal Access Control: Challenges and Applications
收藏 引用
14th acm symposium on access control models and technologies
作者: Damiani, Maria Luisa Martin, Herve Saygin, Yucel Spada, Maria Rita Ulmer, Cedric Univ Milan I-20122 Milan Italy
In the last few years, a number of spatial and spatio-temporal access control models have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effectiv... 详细信息
来源: 评论
the Next 700 access control models or a Unifying Meta-Model?  09
The Next 700 Access Control Models or a Unifying Meta-Model?
收藏 引用
14th acm symposium on access control models and technologies
作者: Barker, Steve Kings Coll London Dept Comp Sci London WC2A 2LS England
We address some fundamental questions, which were raised by Atluri and Ferraiolo at SacmAT'08, on the prospects for and benefits of a meta-model of access control. We demonstrate that a meta-model for access contr... 详细信息
来源: 评论
Usability Meets access control: Challenges and Research Opportunities  09
Usability Meets Access Control: Challenges and Research Oppo...
收藏 引用
14th acm symposium on access control models and technologies
作者: Beznosov, Konstantin Inglesant, Philip Lobo, Jorge Reeder, Rob Zurko, Mary Ellen Univ British Columbia Vancouver BC V5Z 1M9 Canada
this panel discusses specific challenges in the usability of access control technologies and new opportunities for research. the questions vary from "Why nobody, even experts, uses access control lists (ACLs)?&qu... 详细信息
来源: 评论
Automating Role-based Provisioning by Learning from Examples  09
Automating Role-based Provisioning by Learning from Examples
收藏 引用
14th acm symposium on access control models and technologies
作者: Ni, Qun Lobo, Jorge Calo, Seraphin Rohatgi, Pankaj Bertino, Elisa Purdue Univ W Lafayette IN 47907 USA
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existing roles to entitlements from newly dep... 详细信息
来源: 评论