咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是171-180 订阅
排序:
Preventing information inference in access control  15
Preventing information inference in access control
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Paci, Federica Zannone, Nicola University of Southampton United Kingdom Eindhoven University of Technology Netherlands
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy conce... 详细信息
来源: 评论
Relationship-based access control for an open-source medical records system  15
Relationship-based access control for an open-source medical...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Rizvi, Syed Zain R. Fong, Philip W.L. Crampton, Jason Sellwood, James University of Calgary AB Canada Royal Holloway University of London Egham United Kingdom
Inspired by the access control models of social network systems, Relationship-Based access control (ReBAC) was recently proposed as a general-purpose access control paradigm for application domains in which authorizat... 详细信息
来源: 评论
SacmAT 2014 - proceedings of the 19th acm symposium on access control models and technologies
SACMAT 2014 - Proceedings of the 19th ACM Symposium on Acces...
收藏 引用
19th acm symposium on access control models and technologies, SacmAT 2014
The proceedings contain 22 papers. The topics discussed include: hardware-enhanced distributed access enforcement for role-based access control;an access control concept for novel automotive HMI systems;monitor placem...
来源: 评论
Federated access management for collaborative network environments: Framework and case study  15
Federated access management for collaborative network enviro...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Rubio-Medrano, Carlos E. Zhao, Ziming Doupé, Adam Ahn, Gail-Joon Arizona State University TempeAZ United States
With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of being involved in inter-organizational, mul... 详细信息
来源: 评论
Mitigating access control vulnerabilities through interactive static analysis  15
Mitigating access control vulnerabilities through interactiv...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Zhu, Jun Chu, Bill Lipford, Heather Thomas, Tyler University of North Carolina at Charlotte CharlotteNC28223 United States
access control vulnerabilities due to programming errors have consistently ranked amongst top software vulnerabilities. Previous research efforts have concentrated on using automatic program analysis techniques to det... 详细信息
来源: 评论
On missing attributes in access control: Non-deterministic and probabilistic attribute retrieval  15
On missing attributes in access control: Non-deterministic a...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Crampton, Jason Morisset, Charles Zannone, Nicola Royal Holloway University of London United Kingdom Newcastle University United Kingdom Eindhoven University of Technology Netherlands
Attribute Based access control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are defined in terms of pairs attribute names... 详细信息
来源: 评论
Mohawk+T: Efficient analysis of administrative temporal role-based access control (ATRBAC) policies  15
Mohawk+T: Efficient analysis of administrative temporal role...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Shahen, Jonathan Niu, Jianwei Tripunitara, Mahesh University of Waterloo Canada University of Texas San Antonio United States
Safety analysis is recognized as a fundamental problem in access control. It has been studied for various access control schemes in the literature. Recent work has proposed an administrative model for Temporal Role-Ba... 详细信息
来源: 评论
Towards an automatic top-down role engineering approach using natural language processing techniques  15
Towards an automatic top-down role engineering approach usin...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Narouei, Masoud Takabi, Hassan Department of Computer Science and Engineering University of North Texas DentonTX United States
Role Based access control (RBAC) is the most widely used model for access control due to the ease of administration as well as economic benefits it provides. In order to deploy an RBAC system, one requires to first id... 详细信息
来源: 评论
A logic of trust for reasoning about delegation and revocation  15
A logic of trust for reasoning about delegation and revocati...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Cramer, Marcos Ambrossio, Diego Agustín Van Hertum, Pieter University of Luxembourg Luxembourg KU Leuven Belgium
In ownership-based access control frameworks with the possibility of delegating permissions and administrative rights, chains of delegated accesses will form. There are different ways to treat these delegation chains ... 详细信息
来源: 评论
Towards a general framework for optimal role mining: A constraint satisfaction approach  15
Towards a general framework for optimal role mining: A const...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Jafarian, Jafar Haadi Takabi, Hassan Touati, Hakim Hesamifard, Ehsan Shehab, Mohamed Department of Software and Information Systems University of North Carolina at Charlotte CharlotteNC United States Department of Computer Science and Engineering University of North Texas DentonTX United States
Role Based access control (RBAC) is the most widely used advanced access control model deployed in a variety of organizations. To deploy an RBAC system, one needs to first identify a complete set of roles, including p... 详细信息
来源: 评论