咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是391-400 订阅
排序:
Using Semantics for Automatic Enforcement of access control Policies among Dynamic Coalitions  07
Using Semantics for Automatic Enforcement of Access Control ...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Warner, Janice Atluri, Vijayalakshmi Mukkamala, Ravi Vaidya, Jaideep Rutgers State Univ MSIS Dept Piscataway NJ 08855 USA
In a dynamic coalition environment, organizations should be able to exercise their own local fine-grained access control policies while sharing resources with external entities. In this paper, we propose an approach t... 详细信息
来源: 评论
Towards Realizing a Formal RBAC Model in Real Systems  07
Towards Realizing a Formal RBAC Model in Real Systems
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Ahn, Gail-Joon Hu, Hongxin Univ N Carolina Charlotte NC 28223 USA
there still exists an open question on how formal models can be fully realized in the system development phase. the Model Driven Development (MDD) approach has been recentlyintroduced to deal with such a critical issu... 详细信息
来源: 评论
An Approach to Evaluate Policy Similarity  07
An Approach to Evaluate Policy Similarity
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Lin, Dan Rao, Priathima Bertino, Elisa Lobo, Jorge Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Recent collaborative applications and enterprises very often need to efficiently integrate their access control policies. An important step in policy integration is to analyze the similarity of policies. Existing appr... 详细信息
来源: 评论
Chinese-Wall Process Confinement for Practical Distributed Coalitions  07
Chinese-Wall Process Confinement for Practical Distributed C...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Katsuno, Yasuharu Watanabe, Yuji Furuichi, Sanehiro Kudo, Michiharu IBM Res Corp Tokyo Res Lab Yamato Shi 2428502 Japan
A distributed coalition supports distributed mandatory access controls for resources whose security policies differ for each group of components over nodes, and provides secure information operations and exchanges wit... 详细信息
来源: 评论
PEI models towards Scalable, Usable and High-Assurance Information Sharing  07
PEI Models towards Scalable, Usable and High-Assurance Infor...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Krishnan, Ram Sandhu, Ravi Ranganathan, Kumar George Mason Univ Lab Informat Secur Technol Fairfax VA 22030 USA
Secure Information Sharing (SIS) or "share but protect" is a challenging and elusive problem both because of its broad scope and complexity ranging right from conception (objective and policy) to culmination... 详细信息
来源: 评论
A Posteriori Compliance control  07
A Posteriori Compliance Control
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Etalle, Sandro Winsborough, William H. Univ Twente Enschede Netherlands
While preventative policy enforcement mechanisms can provide theoretical guarantees that policy is correctly enforced, they have limitations in practice. they are inflexible when unanticipated circumstances arise, and... 详细信息
来源: 评论
Distributed access control: A Privacy-conscious Approach  07
Distributed Access Control: A Privacy-conscious Approach
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Cautis, Bogdan INRIA Futurs Futurs Italy
With more and more information being exchanged or published on the Web or in peer-to-peer, and with the significant growth in numbers of distributed, heterogeneous data sources, issues like access control and data pri... 详细信息
来源: 评论
Towards a VMM-based Usage control Framework for OS Kernel Integrity Protection  07
Towards a VMM-based Usage Control Framework for OS Kernel In...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Xu, Min Jiang, Xuxian Sandhu, Ravi Zhang, Xinwen George Mason Univ Fairfax VA 22030 USA
Protecting kernel integrity is one of the fundamental security objectives in building a trustworthy operating system (OS). For this end, a variety of approaches and systems have been proposed and developed. However, a... 详细信息
来源: 评论
GEO-RBAC: A spatially aware RBAC
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2007年 第1期10卷 2.1-2.42页
作者: Damiani, Maria Luisa Bertino, Elisa Catania, Barbara Perlasca, Paolo Univ Milan Dipartimento Informat & Comunicaz I-20135 Milan Italy Ecole Polytech Fed Lausanne IC LBD CH-1015 Lausanne Switzerland Univ Genoa Dipartimento Informat & Sci Informat I-16146 Genoa Italy Purdue Univ CERIAS CS Dept W Lafayette IN 47907 USA Purdue Univ ECE Sch W Lafayette IN 47907 USA
Securing access to data in location- based services and mobile applications requires the definition of spatially aware access- control systems. Even if some approaches have already been proposed either in the context ... 详细信息
来源: 评论
Mesh: Secure, Lightweight Grid Middleware Using Existing SSH Infrastructure  07
Mesh: Secure, Lightweight Grid Middleware Using Existing SSH...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Kolano, Paul Z. NASA Ames Res Ctr Adv Supercomp Div Moffett Field CA 94035 USA
Grid computing promises gains in effective computational power. resource utilization, and resource accessibility, but in order to achieve these gains. organizations must deploy grid middleware that, in most cases. doe... 详细信息
来源: 评论