咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是401-410 订阅
排序:
GEO-RBAC: A spatially aware RBAC  05
GEO-RBAC: A spatially aware RBAC
收藏 引用
10th acm symposium on access control models and technologies
作者: Damiani, Maria Luisa Bertino, Elisa Catania, Barbara Perlasca, Paolo Univ Milan Dipartimento Informat & Comunicaz I-20135 Milan Italy Ecole Polytech Fed Lausanne IC LBD CH-1015 Lausanne Switzerland Univ Genoa Dipartimento Informat & Sci Informat I-16146 Genoa Italy Purdue Univ CERIAS CS Dept W Lafayette IN 47907 USA Purdue Univ ECE Sch W Lafayette IN 47907 USA
Securing access to data in location- based services and mobile applications requires the definition of spatially aware access- control systems. Even if some approaches have already been proposed either in the context ... 详细信息
来源: 评论
Session details: access control in novel systems  07
Session details: Access control in novel systems
收藏 引用
Proceedings of the 12th acm symposium on access control models and technologies
作者: E. Bertino Purdue University
No abstract available.
来源: 评论
Session details: Short papers: access control  07
Session details: Short papers: access control
收藏 引用
Proceedings of the 12th acm symposium on access control models and technologies
作者: E. Ferrari University of Insubria at Varese
No abstract available.
来源: 评论
Session details: Novel access control techniques  07
Session details: Novel access control techniques
收藏 引用
Proceedings of the 12th acm symposium on access control models and technologies
作者: T. Jaeger The Pennsylvania State University
No abstract available.
来源: 评论
Relevancy-based access control and its evaluation on versioned XML documents
收藏 引用
acm TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2007年 第1期10卷 3.1-3.31页
作者: Iwaihara, Mizuho Hayashi, Ryotaro Chatvichienchai, Somchai Anutariya, Chutiporn Wuwongse, Vilas Kyoto Univ Dept Social Informat Sakyo Ku Kyoto 6068501 Japan Siebold Univ Nagasaki Nagasaki Japan
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable information on dependencie... 详细信息
来源: 评论
SacmAT 2006: Proceedings of the Eleventh acm symposium on access control models and technologies
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Ac...
收藏 引用
11th acm symposium on access control models and technologies, SacmAT 2006
the proceedings contain 25 papers. the topics discussed include: key management for non-tree access hierarchies;PRIMA: policy-reduced integrity measurement architecture;on classifying access control implementations fo... 详细信息
来源: 评论
A Coexistence Model of IEEE 802.15.4 and IEEE 802.11b/g
A Coexistence Model of IEEE 802.15.4 and IEEE 802.11b/g
收藏 引用
IEEE symposium on Communications and Vehicular Technology (SCVT)
作者: Wei Yuan Xiangyu Wang Jean-Paul M. G. Linnartz Philips Research Eindhoven Netherlands Delft University of Technnology Delft Netherlands Eindhovan University of Technology Eindhoven Netherlands
IEEE 802.15.4 was developed to meet the needs for low-rate wireless communication. However, due to its low power, IEEE 802.15.4 is potentially vulnerable to interference by other wireless technologies having much high... 详细信息
来源: 评论
Proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
Proceedings of acm symposium on access control models and technologies, SacmAT 2006年 2006卷 iii页
作者: Ferraiolo, David Ray, Indrakshi National Institute of Standards and Technologies United States Sacmat'06 Program Colorado State University United States
No abstract available
来源: 评论
Investigations of Cross-Layer Designs for Mobile Ad Hoc Networks
Investigations of Cross-Layer Designs for Mobile Ad Hoc Netw...
收藏 引用
Quality of Service, 2006 14th IEEE International Workshop on;Princeton,NJ
作者: Xiaoyu Hu Yu-Dong Yao Charles Graff Trevor Cook Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA U.S. Army RDECOM CERDEC NJ USA
this paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (P... 详细信息
来源: 评论
access control, confidentiality and privacy for video surveillance databases  06
Access control, confidentiality and privacy for video survei...
收藏 引用
11th acm symposium on access control models and technologies, SacmAT 2006
作者: thuraisingham, Bhavani Lavee, Gal Bertino, Elisa Fan, Jianping Khan, Latifur Department of Computer Science University of Texas Dallas United States Department of Computer Science Purdue University United States Department of Computer Science UNC-Charlotte United States
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discussed an access control model and acced... 详细信息
来源: 评论