咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是421-430 订阅
排序:
A framework for managing inter-site storage area networks using grid technologies
A framework for managing inter-site storage area networks us...
收藏 引用
14th NASA Goddard / 23rd IEEE Conference on Mass Storage Systems and technologies: "the Global Storage Grid: High-Speed, Secure access to Data on Open, Global Networks", MSST 2006
作者: McCall, Fritz Kobler, Ben Smorul, Mike University of Maryland Institute For Advanced Computer Studies United States NASA Goddard Space Flight Center United States
the NASA Goddard Space Flight Center and the University of Maryland Institute for Advanced Computer Studies are studying mechanisms for installing and managing Storage Area Networks (SANs) that span multiple independe... 详细信息
来源: 评论
Quorum placement in networks: Minimizing network congestion
Quorum placement in networks: Minimizing network congestion
收藏 引用
25th Annual acm symposium on Principles of Distributed Computing 2006
作者: Golovin, Daniel Gupta, Anupam Maggs, Bruce M. Oprea, Florian Reiter, Michael K. Computer Science Department Carnegie Mellon University Pittsburgh PA United States Electrical and Computer Engineering Department Carnegie Mellon University Pittsburgh PA United States Akamai Technologies Cambridge MA United States
A quorum system over a universe of logical elements is a collection of subsets (quorums) of elements, any two of which intersect. In numerous distributed algorithms, the elements of the universe reside on the nodes of... 详细信息
来源: 评论
Implementation of offloading the iSCSI and TCP/IP protocol onto host bus adapter
Implementation of offloading the iSCSI and TCP/IP protocol o...
收藏 引用
14th NASA Goddard / 23rd IEEE Conference on Mass Storage Systems and technologies: "the Global Storage Grid: High-Speed, Secure access to Data on Open, Global Networks", MSST 2006
作者: Chen, Han-Chiang Wu, Zheng-Ji Wu, Zhong-Zhen Industrial Technology Research Institute Taiwan
the iSCSI storage can provide high speed, easy management and low cost advantages to satisfy the requirements of small-size IT departments. Usually, the servers running iSCSI protocols suffer from the heavy IO process... 详细信息
来源: 评论
thermal attacks on storage systems
Thermal attacks on storage systems
收藏 引用
14th NASA Goddard / 23rd IEEE Conference on Mass Storage Systems and technologies: "the Global Storage Grid: High-Speed, Secure access to Data on Open, Global Networks", MSST 2006
作者: Paul, Nathanael Gurumurthi, Sudhanva Evans, David University of Virginia Department of Computer Science Charlottesville VA United States
Disk drives are a performance bottleneck for data-intensive applications. Drive manufacturers have continued to increase the rotational speeds to meet performance requirements, but the faster drives consume more power... 详细信息
来源: 评论
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
SACMAT 2005: Proceedings of 10th ACM Symposium on Access Con...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
the proceedings contain 19 papers. the topics discussed include: integrity constraints in trust management;declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastruc... 详细信息
来源: 评论
Proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
Proceedings of acm symposium on access control models and technologies, SacmAT 2005年 iii页
作者: Ferrari, Elena Ahn, Gail-Joon
No abstract available
来源: 评论
Future direction of access control models, architectures, and technologies  05
Future direction of access control models, architectures, an...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Beznosov, Konstantin University of British Columbia Canada
No abstract available
来源: 评论
Rule support for role-based access control  05
Rule support for role-based access control
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Kern, Axel Walhorn, Claudia Beta Systems Software AG Josef-Lammerting-Allee 14 50933 Köln Germany
the administration of users and access rights in large enterprises is a complex and challenging task. Role-based access control (RBAC) is a powerful concept for simplifying access control. In particular. Enterprise Ro... 详细信息
来源: 评论
Verifiable composition of access control and application features  05
Verifiable composition of access control and application fea...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Song, Eunjee Reddy, Raghu France, Robert Ray, Indrakshi Georg, Geri Alexander, Roger Computer Science Dept. Colorado State University Fort Collins CO 80523
access control features are often spread across and tangled with other functionality in a design. this makes modifying and replacing these features in a design difficult. Aspect-oriented modeling (AOM) techniques can ... 详细信息
来源: 评论
Peer-to-peer access control architecture using trusted computing technology  05
Peer-to-peer access control architecture using trusted compu...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Sandhu, Ravi Zhang, Xinwen George Mason University
It has been recognized for some lime that software alone does not provide an adequate foundation for building a high-assurance trusted platform. the emergence of industry-standard trusted computing technologies promis... 详细信息
来源: 评论