咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是191-200 订阅
排序:
Sorting Out Role Based access control  14
Sorting Out Role Based Access Control
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Kuijper, Wouter Ermolaev, Victor Nedap NV Parallelweg 2 NL-7141 DC Groenlo Netherlands
Role-based access control (RBAC) is a popular framework for modelling access control rules. In this paper we identify a fragment of RBAC called bi-sorted role based access control (RBAC). We start from the observation... 详细信息
来源: 评论
Attribute Based access control for APIs in Spring Security  14
Attribute Based Access Control for APIs in Spring Security
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Armando, Alessandro Carbone, Roberto Chekole, Eyasu Getahun Ranise, Silvio Univ Genoa DIBRIS Genoa Italy FBK Irst Secur & Trust Unit Trento Italy
The widespread adoption of Application Programming Interfaces (APIs) by enterprises is changing the way business is done by permitting the implementation of a multitude of apps, customized to user needs. While support... 详细信息
来源: 评论
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based access control  14
Scalable and Precise Automated Analysis of Administrative Te...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Ranise, Silvio Truong, Anh Armando, Alessandro FBK Irst Secur & Trust Trento Italy
Extensions of Role-Based access control (RBAC) policies taking into account contextual information (such as time and space) are increasingly being adopted in real-world applications. Their administration is complex si... 详细信息
来源: 评论
Hardware-Enhanced Distributed access Enforcement for Role-Based access control  14
Hardware-Enhanced Distributed Access Enforcement for Role-Ba...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Bloom, Gedare Simha, Rahul George Washington Univ Dept Comp Sci Washington DC 20052 USA
The protection of information in enterprise and cloud platforms is growing more important and complex with increasing numbers of users who need to access resources with distinct permissions. Role-based access control ... 详细信息
来源: 评论
Reduction of access control Decisions  14
Reduction of Access Control Decisions
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Morisset, Charles Zannone, Nicola Newcastle Univ Ctr Cybercrime & Comp Secur Newcastle Upon Tyne Tyne & Wear England Eindhoven Univ Technol Eindhoven Netherlands
access control has been proposed as"the" solution to prevent unauthorized accesses to sensitive system resources. Historically, access control models use a two-valued decision set to indicate whether an acce... 详细信息
来源: 评论
Towards Fine Grained RDF access control  14
Towards Fine Grained RDF Access Control
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Rachapalli, Jyothsna Khadilkar, Vaibhav Kantarcioglu, Murat Thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
The Semantic Web is envisioned as the future of the current web, where the information is enriched with machine understandable semantics. According to the World Wide Web Consortium (W3C), "The Semantic Web provid... 详细信息
来源: 评论
Game Theoretic Analysis of Multiparty access control in Online Social Networks  14
Game Theoretic Analysis of Multiparty Access Control in Onli...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Hu, Hongxin Ahn, Gail-Joon Zhao, Ziming Yang, Dejun Clemson Univ Clemson SC 29634 USA Arizona State Univ Tempe AZ 85287 USA Colorado Sch Mines Golden CO 80401 USA
Existing online social networks (OSNs) only allow a single user to restrict access to her/his data but cannot provide any mechanism to enforce privacy concerns over data associated with multiple users. This situation ... 详细信息
来源: 评论
SacmAT 2013 - proceedings of the 18th acm symposium on access control models and technologies
SACMAT 2013 - Proceedings of the 18th ACM Symposium on Acces...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
The proceedings contain 30 papers. The topics discussed include: privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule;evolving role definitions through permission invo...
来源: 评论
Limiting access to Unintentionally Leaked Sensitive Documents Using Malware Signatures  14
Limiting Access to Unintentionally Leaked Sensitive Document...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Guri, Mordechai Kedma, Gabi Carmeli, Buky Elovici, Yuval Ben Gurion Univ Negev Dept Informat Syst Engn Ben Gurion Univ IL-8410501 Beer Sheva Israel Ben Gurion Univ Negev Telekom Innovat Labs Ben Gurion Univ IL-8410501 Beer Sheva Israel
Organizations are repeatedly embarrassed when their sensitive digital documents go public or fall into the hands of adversaries, often as a result of unintentional or inadvertent leakage. Such leakage has been traditi... 详细信息
来源: 评论
What Are the Most Important Challenges for access control in New Computing Domains, such as Mobile, Cloud and Cyber-physical Systems?  14
What Are the Most Important Challenges for Access Control in...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Bauer, Lujo Kerschbaum, Florian Carnegie Mellon Univ Pittsburgh PA 15213 USA SAP Karlsruhe Germany
We are seeing a significant shift in the types and characteristics of computing devices that are commonly used. Today, more smartphones are sold than personal computers. An area of rapid growth are also cloud systems;... 详细信息
来源: 评论