咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 445 篇 英文
  • 13 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是431-440 订阅
排序:
Peer-to-peer access control architecture using trusted computing technology  05
Peer-to-peer access control architecture using trusted compu...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Sandhu, Ravi Zhang, Xinwen George Mason University
It has been recognized for some lime that software alone does not provide an adequate foundation for building a high-assurance trusted platform. the emergence of industry-standard trusted computing technologies promis... 详细信息
来源: 评论
Adaptive trust negotiation and access control  05
Adaptive trust negotiation and access control
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Ryutov, Tatyana Zhou, Li Neuman, Clifford Leithead, Travis Seamons, Kent E. Information Sciences Institute University of Southern California Marina del Rey CA 90292-6695 Internet Security Research Lab. Brigham Young University Provo UT 84602-6576
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-control environment for such transaction... 详细信息
来源: 评论
A reference monitor for workflow systems with constrained task execution  05
A reference monitor for workflow systems with constrained ta...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Crampton, Jason Information Security Group Royal Holloway University of London
We describe a model, independent of any underlying access control paradigm, for specifying authorization constraints such as separation of duty and cardinality constraints in workflow systems. We present a number of r... 详细信息
来源: 评论
Context sensitive access control  05
Context sensitive access control
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Hulsebosch, R.J. Salden, A.M. Bargh, M.S. Ebben, P.W.G. Reitsma, J. Telematica Instituut P.O. Box 589 7500 AN Enschede Netherlands
We investigate the practical feasibility of using context information for controlling access to services. Based solely on situational context, we show that users can be transparently provided anonymous access to servi... 详细信息
来源: 评论
Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure  05
Declaration and enforcement of fine-grained access restricti...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Matheus, Andreas Fakultät für Informatik Technische Universität München Boltzmannstr. 3 D-85748 Garching
this work describes the declaration and enforcement of geospatial access restrictions for the infrastructure of heterogenous and distributed geospatial information objects, as they are accessible via the service-orien... 详细信息
来源: 评论
Relevancy based access control of versioned XML documents  05
Relevancy based access control of versioned XML documents
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Iwaihara, Mizuho Chatvichienchai, Somchai Anutariya, Chutiporn Wuwongse, Vilas Dept. Social Informatics Kyoto University Kyoto 606-8501 Japan Dept. Info.-Media Siebold University of Nagasaki Nagasaki 851-2195 Japan Computer Science Program Shinawatra University Pathumthani 12160 Thailand Computer Science and Information Management Program Asian Institute of Technology Pathumthani 12120 Thailand
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependenci... 详细信息
来源: 评论
Purpose based access control of complex data for privacy protection  05
Purpose based access control of complex data for privacy pro...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Byun, Ji-Won Bertino, Elisa Li, Ninghui CERIAS Department of Computer Sciences Purdue University 656 Oval Drive West Lafayette IN 47907
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development, of privacy protecting technology. We recently proposed a privacy preserving access con... 详细信息
来源: 评论
A fine-grained, controllable, user-to-user delegation method in RBAC  05
A fine-grained, controllable, user-to-user delegation method...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Wainer, Jacques Kumar, Akhil Institute of Computing State University of Campinas Campinas Brazil Smeal College of Business Penn State University University Park PA United States
this paper addresses the issues surrounding user-to-user delegation in RBAC. We show how delegations can be incorporated into the RBAC model in a simple and straightforward manner. A special feature of the model is th... 详细信息
来源: 评论
Remote access to the system of alternative energy sources
Remote access to the system of alternative energy sources
收藏 引用
14th symposium on New technologies in Measurement and Instrumentation and 10th Workshop on ADC Modelling and Testing
作者: Tyml, Petr Roztočil, Jaroslav Czech Technical University in Prague Faculty of Electrical Engineering Department of Measurement Technická 2 166 27 Prague 6 Czech Republic
the paper presents a distributed control and remote monitoring system of alternative energy sources situated in Herbertov (South Bohemia) - a teaching and research centre of the Faculty of Mechanical Engineering, the ... 详细信息
来源: 评论
Role mining with ORCA  05
Role mining with ORCA
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
作者: Schlegelmilch, Jürgen Steffens, Ulrike OFFIS e.V. Escherweg 2 26121 Oldenburg Germany
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, security demands a tight regime on permissi... 详细信息
来源: 评论