咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是201-210 订阅
排序:
Re-thinking Networked Privacy, Security, Identity and access control in our Surveillance States  14
Re-thinking Networked Privacy, Security, Identity and Access...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Clement, Andrew Univ Toronto Fac Informat 140 St George St Toronto ON M5S 3G6 Canada
Mass surveillance activities by the security agencies of the Five Eyes countries (e.g. NSA, CSEC, etc) pose a significant challenge to those who care about the privacy, security and other democratic rights related to ... 详细信息
来源: 评论
An information flow control meta-model  13
An information flow control meta-model
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Kafura, Dennis Gracanin, Denis Department of Computer Science Virginia Tech. Blacksburg VA United States
In this paper a meta-model for information flow control is defined using the foundation of Barker's access control meta-model. The purposes for defining this meta-model is to achieve a more principled understandin... 详细信息
来源: 评论
A versatile access control implementation: Secure box  13
A versatile access control implementation: Secure box
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Botelho, Bruno Alves Pereira Pelluzi, Dennis Guimarães Nakamura, Emilio Tissato Fundação CPqD Rod. Campinas-Mogi-Mirim 13086-902 Campinas - SP Brazil
In this demonstration paper, we describe the implementation of a versatile access control prototype based on multimodal biometrics and graphical passwords that had been designed and developed aligned with the current ... 详细信息
来源: 评论
ERBAC: Event-driven RBAC  13
ERBAC: Event-driven RBAC
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Bonatti, Piero Galdi, Clemente Torres, Davide Dip. di Ingegneria Elettrica e Tecnologie dell'Informazione Università di Napoli Federico II Compl. Univ. Monte S. Angelo I-80126 Napoli Italy NTS Network S.p.A. Corso Monforte 2 20122 Milan Italy
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enf... 详细信息
来源: 评论
A storage-efficient cryptography-based access control solution for subversion  13
A storage-efficient cryptography-based access control soluti...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Leibenger, Dominik Sorge, Christoph University of Paderborn Warburger Straße 100 33098 Paderborn Germany
Version control systems are widely used in software development and document management. Unfortunately, versioning confidential files is not normally supported: Existing solutions encrypt the transport channel, but st... 详细信息
来源: 评论
Specification and analysis of access control policies for mobile applications  13
Specification and analysis of access control policies for mo...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Abdunabi, Ramadan Ray, Indrakshi France, Robert Computer Science Dept. Colorado State University Fort Collins CO 80523 United States
Mobile applications allow individuals on-the-move access to resources "anytime, anywhere" using hand-held mobile devices. We argue that for critical and sensitive resources this is often times not desirable ... 详细信息
来源: 评论
Heuristic safety analysis of access control models  13
Heuristic safety analysis of access control models
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Amthor, Peter Kühnhauser, Winfried E. Pölck, Anja Ilmenau University of Technology Germany
Model-based security engineering uses formal security models for specifying and analyzing access control systems. Tool-based model analysis encounters a fundamental difficulty here: on the one hand, real-world access ... 详细信息
来源: 评论
Secure benchmarking in the cloud  13
Secure benchmarking in the cloud
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Schroepfer, Axel Schaad, Andreas Kerschbaum, Florian Boehm, Heiko Jooss, Joerg SAP Research Security and Trust Vincenz-Priessnitz Str. 1 76131 Karlsruhe Germany Microsoft Deutschland GmbH Konrad-Zuse-Straße 1 85716 Unterschleißheim Germany
Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business proces... 详细信息
来源: 评论
A BigData platform for analytics on access control policies and logs  13
A BigData platform for analytics on access control policies ...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Chari, Suresh Habeck, Ted Molloy, Ian Park, Youngja Teiken, Wilfried IBM Research T.J. Watson Yorktown Heights NY United States
Relying on an access control security policy alone to protect valuable resources is a dangerous practice. Prudent security must engage in other risk management and mitigation techniques to rapidly detect and recover f... 详细信息
来源: 评论
Sticky policies for mobile devices  13
Sticky policies for mobile devices
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Di Cerbo, Francesco Trabelsi, Slim Steingruber, Thomas Dodero, Gabriella Bezzi, Michele Applied Research Security and Trust SAP Labs France 805 av. Donat 06250 Mougins France Free University of Bozen-Bolzano Piazza Universitá 1 39100 Bolzano-Bozen Italy
Mobile devices consume significant amounts of information, from different sources. Thus they often deal also with sensitive or confidential data, in places or situations that could be not appropriate, or not compliant... 详细信息
来源: 评论