咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是371-380 订阅
排序:
access control for adaptive reservations on multi-user systems
Access control for adaptive reservations on multi-user syste...
收藏 引用
14th IEEE Real-Time and Embedded Technology and Applications symposium
作者: Cucinotta, Tommaso Scuola Superiore Sant'Anna
this paper tackles the problem of defining an appropriate access control model for multi-user systems providing adaptive resource reservations to unprivileged users. Security requirements that need to be met by the sy... 详细信息
来源: 评论
A General Obligation Model and Continuity-Enhanced Policy Enforcement Engine for Usage control  08
A General Obligation Model and Continuity-Enhanced Policy En...
收藏 引用
13th acm symposium on access control models and technologies
作者: Katt, Basel Hafner, Michael Zhang, Xinwen Breu, Ruth Seifert, Jean-Pierre Univ Innsbruck A-6020 Innsbruck Austria
the usage control model (UCON) has been proposed to augment traditional access control models by integrating authorizations, obligations, and conditions and providing the properties of decision continuity and attribut... 详细信息
来源: 评论
Enforcing Security Properties in Task-based Systems  08
Enforcing Security Properties in Task-based Systems
收藏 引用
13th acm symposium on access control models and technologies
作者: Irwin, Keith Yu, Ting Winsborough, William H. N Carolina State Univ Raleigh NC 27695 USA
though a user's privileges are often granted based on the tasks that the user is expected to fulfill, the concept of tasks is usually not explicitly modeled in access control. We propose a system where tasks are t... 详细信息
来源: 评论
Task-Based Entailment Constraints for Basic Workflow Patterns  08
Task-Based Entailment Constraints for Basic Workflow Pattern...
收藏 引用
13th acm symposium on access control models and technologies
作者: Wolter, Christian Schaad, Andreas Meinel, Christoph SAP Res D-76131 Karlsruhe Germany
access control decisions are based on the authorisation policies defined for a system as well as observed context and behaviour when evaluating these constraints at runtime. Workflow management systems have been recog... 详细信息
来源: 评论
Fast Exact and Heuristic Methods for Role Minimization Problems  08
Fast Exact and Heuristic Methods for Role Minimization Probl...
收藏 引用
13th acm symposium on access control models and technologies
作者: Ene, Alina Rao, Prasad Horne, William Schreiber, Robert Milosavljevic, Nikola Tarjan, Robert E. Princeton Univ Dept Comp Sci Princeton NJ 08540 USA
We describe several new bottom-up approaches to problems in role engineering for Role-Based access control (RBAC). the salient problems are all NP-complete, even to approximate, yet we find that in instances that aris... 详细信息
来源: 评论
New constructions for provably-secure time-bound hierarchical key assignment schemes  07
New constructions for provably-secure time-bound hierarchica...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: De Santis, Alfredo Ferrara, Anna Lisa Masucci, Barbara Univ Salerno Dipartimento Informat & Applicaz I-84084 Fisciano SA Italy
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the... 详细信息
来源: 评论
New constructions for provably-secure time-bound hierarchical key assignment schemes
收藏 引用
thEORETICAL COMPUTER SCIENCE 2008年 第1-3期407卷 213-230页
作者: De Santis, Alfredo Ferrara, Anna Lisa Masucci, Barbara Univ Salerno Dipartimento Informat & Applicaz I-84084 Fisciano SA Italy
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the... 详细信息
来源: 评论
RCWLBAC - representing role based access control in OWL
RCWLBAC - representing role based access control in OWL
收藏 引用
13th acm symposium on access control models and technologies, SacmAT'08
作者: Finin, T. Joshi, A. Kagal, L. Niu, J. Sandhu, R. Winsborough, W. thuraisingham, B. Univ. of Maryland Baltimore United States Massachusetts Institute of Technology Univ. of Texas San Antonio United States Univ. of Texas Dallas
there have been two parallel themes in access control re-search in recent years. On the one hand there are efforts to develop new access control models to meet the policy needs of real world application domains. In pa... 详细信息
来源: 评论
SacmAT'07: Proceedings of the 12th acm symposium on access control models and technologies
SACMAT'07: Proceedings of the 12th ACM Symposium on Access C...
收藏 引用
SacmAT'07: 12th acm symposium on access control models and technologies
the proceedings contain 28 papers. the topics discussed include: An approach to evaluate policy similarity;a posteriori compliance control;enforcing access control over data streams;fine-grained access control to web ... 详细信息
来源: 评论
ROWLBAC: representing role based access control in OWL  08
ROWLBAC: representing role based access control in OWL
收藏 引用
Proceedings of the 13th acm symposium on access control models and technologies
作者: T. Finin A. Joshi L. Kagal J. Niu R. Sandhu W. Winsborough B. thuraisingham Univ. of Maryland Massachusetts Institute of Technology Univ. of Texas at San Antonio Univ. of Texas Dallas
there have been two parallel themes in access control research in recent years. On the one hand there are efforts to develop new access control models to meet the policy needs of real world application domains. In par... 详细信息
来源: 评论