咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是181-190 订阅
排序:
Fine-grained business data confidentiality control in cross-organizational tracking  15
Fine-grained business data confidentiality control in cross-...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Han, Weili Zhang, Yin Guo, Zeqing Bertino, Elisa Software School Fudan University Shanghai Key Laboratory of Data Science Shanghai201203 China Department of Computer Science Purdue University West LafayetteIN47907 United States
With the support of the Internet of Things (IoT for short) technologies, tracking systems are being widely deployed in many companies and organizations in order to provide more efficient and trustworthy delivery servi... 详细信息
来源: 评论
Attribute-Based access control models and Beyond  15
Attribute-Based Access Control Models and Beyond
收藏 引用
proceedings of the 10th acm symposium on Information, Computer and Communications Security
作者: Ravi Sandhu University of Texas at San Antonio USA
This talk will provide a perspective on attribute-based access control (ABAC). The ongoing authorization leap from rights to attributes offers numerous compelling benefits. Decisions about user, subject, object and co... 详细信息
来源: 评论
Challenges in Making access control Sensitive to the "Right" Contexts  15
Challenges in Making Access Control Sensitive to the "Right"...
收藏 引用
proceedings of the 20th acm symposium on access control models and technologies
作者: Trent Jaeger Pennsylvania State University University Park PA USA
access control is a fundamental security mechanism that both protects processes from attacks and confines compromised processes that may try to propagate an attack. Nonetheless, we still see an ever increasing number ... 详细信息
来源: 评论
Redaction based RDF access control Language  14
Redaction based RDF Access Control Language
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Rachapalli, Jyothsna Khadilkar, Vaibhav Kantarcioglu, Murat Thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
We propose an access control language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF access control. The access control language ... 详细信息
来源: 评论
access control models for Geo-Social Computing Systems  14
Access Control Models for Geo-Social Computing Systems
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Tarameshloo, Ebrahim Fong, Philip W. L. Univ Calgary Dept Comp Sci Calgary AB Canada
A Geo-Social Computing System (GSCS) allows users to declare their current locations, and uses these declared locations to make authorization decisions. Recent years have seen the emergence of a new generation of soci... 详细信息
来源: 评论
Anomaly Detection and Visualization in Generative RBAC models  14
Anomaly Detection and Visualization in Generative RBAC Model...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Leitner, Maria Rinderle, Stefanie Univ Vienna Fac Comp Sci Vienna Austria SBA Res Vienna Austria
With the wide use of Role-based access control (RBAC), the need for monitoring, evaluation, and verification of RBAC implementations (e.g., to evaluate ex post which users acting in which roles were authorized to exec... 详细信息
来源: 评论
Policy models to Protect Resource Retrieval  14
Policy Models to Protect Resource Retrieval
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Vijayakumar, Hayawardh Ge, Xinyang Jaeger, Trent Penn State Univ Dept Comp Sci & Engn Syst & Internet Infrastruct Secur Lab University Pk PA 16802 USA
Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabi... 详细信息
来源: 评论
An access control Concept for Novel Automotive HMI Systems  14
An Access Control Concept for Novel Automotive HMI Systems
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Gansel, Simon Schnitzer, Stephan Gilbeau-Hammoud, Ahmad Friesen, Viktor Duerr, Frank Rothermel, Kurt Maihoefer, Christian Daimler AG Syst Architecture & Platforms Dept Mercedes Benz Cars Div Sindelfingen Germany Univ Stuttgart Inst Parallel & Distributed Syst Stuttgart Germany
The relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer ... 详细信息
来源: 评论
Path Conditions and Principal Matching: A New Approach to access control  14
Path Conditions and Principal Matching: A New Approach to Ac...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Crampton, Jason Sellwood, James Royal Holloway Univ London Egham Surrey England
Traditional authorization policies are user-centric, in the sense that authorization is defined, ultimately, in terms of user identities. We believe that this user-centric approach is inappropriate for many applicatio... 详细信息
来源: 评论
An Actor-Based, Application-Aware access control Evaluation Framework  14
An Actor-Based, Application-Aware Access Control Evaluation ...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Garrison, William C., III Lee, Adam J. Hinrichs, Timothy L. Univ Pittsburgh Dept Comp Sci Pittsburgh PA 15260 USA VMware Inc Palo Alto CA USA
To date, most work regarding the formal analysis of access control schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property th... 详细信息
来源: 评论