咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是341-350 订阅
排序:
Extending access control models with Break-glass  09
Extending Access Control Models with Break-glass
收藏 引用
14th acm symposium on access control models and technologies
作者: Brucker, Achim D. Petritsch, Helmut SAP Res D-76131 Karlsruhe Germany
access control models are usually static, i.e., permissions are granted based on a policy that only changes seldom. Especially for scenarios in health care and disaster management, a more flexible support of access co... 详细信息
来源: 评论
Efficient access Enforcement in Distributed Role-Based access control (RBAC) Deployments  09
Efficient Access Enforcement in Distributed Role-Based Acces...
收藏 引用
14th acm symposium on access control models and technologies
作者: Tripunitara, Mahesh V. Carbunar, Bogdan Univ Waterloo ECE Dept Waterloo ON N2L 3G1 Canada
We address the distributed setting for enforcement of a centralized Role-Based access control (RBAC) protection state. We present a new approach for time- and space-efficient access enforcement. Underlying our approac... 详细信息
来源: 评论
A Semantic Web Based Framework for Social Network access control  09
A Semantic Web Based Framework for Social Network Access Con...
收藏 引用
14th acm symposium on access control models and technologies
作者: Carminati, Barbara Ferrari, Elena Heatherly, Raymond Kantarcioglu, Murat thurainsingham, Bhavani Univ Insubria Varese Italy
the existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community organization. On the other hand, securit... 详细信息
来源: 评论
An Algebra for Fine-Grained Integration of XacmL Policies  09
An Algebra for Fine-Grained Integration of XACML Policies
收藏 引用
14th acm symposium on access control models and technologies
作者: Rao, Prathima Lin, Dan Bertino, Elisa Li, Ninghui Lobo, Jorge Purdue Univ W Lafayette IN 47907 USA
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to su... 详细信息
来源: 评论
An Efficient Framework for User Authorization Queries in RBAC Systems  09
An Efficient Framework for User Authorization Queries in RBA...
收藏 引用
14th acm symposium on access control models and technologies
作者: Wickramaarachchi, Guneshi T. Qardaji, Wahbeh H. Li, Ninghui Purdue Univ Lafayette IN 47907 USA
the User Authorization Query (UAQ) Problem for RBAC, introduced by Zhang and Joshi [9], is to determine the set of roles to be activated in a single session for a particular set of permissions requested by the user. T... 详细信息
来源: 评论
Safety in Discretionary access control for Logic-based Publish-Subscribe Systems  09
Safety in Discretionary Access Control for Logic-based Publi...
收藏 引用
14th acm symposium on access control models and technologies
作者: Minami, Kazuhiro Borisov, Nikita Gunter, Carl A. Univ Illinois Urbana IL 61801 USA
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the privacy of sensitive information, such a... 详细信息
来源: 评论
Working Set-Based access control for Network File Systems  09
Working Set-Based Access Control for Network File Systems
收藏 引用
14th acm symposium on access control models and technologies
作者: Smaldone, Stephen Ganapathy, Vinod Iftode, Liviu Rutgers The State University of New Jersey Piscataway NJ USA
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal home computers and mobile devices, such as ... 详细信息
来源: 评论
Ensuring Spatio-Temporal access control for Real-World Applications  09
Ensuring Spatio-Temporal Access Control for Real-World Appli...
收藏 引用
14th acm symposium on access control models and technologies
作者: Toahchoodee, Manachai Ray, Indrakshi Anastasakis, Kyriakos Georg, Geri Bordbar, Behzad Colorado State Univ Dept Comp Sci Ft Collins CO 80523 USA
Traditional access control models, such as Role-Based access control (RBAC), do not take into account contextual information, such as location and time, for making access decisions. Consequently, they are inadequate f... 详细信息
来源: 评论
Symbolic Reachability Analysis for Parameterized Administrative Role Based access control  09
Symbolic Reachability Analysis for Parameterized Administrat...
收藏 引用
14th acm symposium on access control models and technologies
作者: Stoller, Scott D. Yang, Ping Gofman, Mikhail Ramakrishnan, C. R. SUNY Stony Brook Dept Comp Sci Stony Brook NY USA
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role based access control (ARBAC) policy spec... 详细信息
来源: 评论
access control Policy Combining: theory Meets Practice  09
Access Control Policy Combining: Theory Meets Practice
收藏 引用
14th acm symposium on access control models and technologies
作者: Li, Ninghui Wang, Qihua Qardaji, Wahbeh Bertino, Elisa Rao, Prathima Lobo, Jorge Lin, Dan Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Many access control policy languages, e.g., XacmL, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the results of the sub-policies according to som... 详细信息
来源: 评论