咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是211-220 订阅
排序:
Enabling intensional access control via preference-aware query optimization  13
Enabling intensional access control via preference-aware que...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Farnan, Nicholas L. Lee, Adam J. Chrysanthis, Panos K. Yu, Ting Department of Computer Science University of Pittsburgh Pittsburgh PA United States Department of Computer Science North Carolina State University Raleigh NC United States
Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evalua... 详细信息
来源: 评论
Content-based information protection and release in NATO operations  13
Content-based information protection and release in NATO ope...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Armando, Alessandro Grasso, Matteo Oudkerk, Sander Ranise, Silvio Wrona, Konrad DIBRIS U. of Genova Italy Security and Trust Unit FBK-Irst Trento Italy Agent Sierra Consultancy Services Amsterdam Netherlands NATO Communications and Information Agency The Hague Netherlands
The successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted u... 详细信息
来源: 评论
Beyond accountability: Using obligations to reduce risk exposure and deter insider attacks  13
Beyond accountability: Using obligations to reduce risk expo...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Baracaldo, Nathalie Joshi, James University of Pittsburgh School of Information Sciences United States
Recently, the importance of including obligations as part of access control systems for privilege management, for example, in healthcare information systems, has been well recognized. In an access control system, an a... 详细信息
来源: 评论
On the notion of redundancy in access control policies  13
On the notion of redundancy in access control policies
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Guarnieri, Marco Neri, Mario Arrigoni Magri, Eros Mutti, Simone Institute of Information Security ETH Zürich Switzerland Università degli Studi Bergamo Italy Comelit R and D Comelit Group S.p.A Italy
The evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may incr... 详细信息
来源: 评论
HyXAC: A hybrid approach for XML access control  13
HyXAC: A hybrid approach for XML access control
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Thimma, Manogna Tsui, Tsam Kai Luo, Bo Cerner Corporation Kansas City MO United States NIPR Kansas City MO United States EECS University of Kansas Lawrence KS United States
While XML has been widely adopted for information sharing over the Internet, the need for efficient XML access control naturally arise. Various XML access control enforcement mechanisms have been proposed in the resea... 详细信息
来源: 评论
Permission path analysis based on access intelligence  13
Permission path analysis based on access intelligence
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Sturm, Detlef Kern, Axel Beta Systems Software AG Alt-Moabit 90d D-10559 Berlin Germany Beta Systems Software AG Josef-Lammertings-Allee 14 D-50933 Köln Germany
The current Idintity and access Management (IAM) landscape mainly consists of classic Identity Management (IdM) and business-oriented access Governance. IdM focuses more on providing a single point of administration a... 详细信息
来源: 评论
Information flow control for stream processing in clouds  13
Information flow control for stream processing in clouds
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Xie, Xing Ray, Indrakshi Adaikkalavan, Raman Gamble, Rose Computer Science Department Colorado State University Fort Collins CO 80523 United States Computer and Information Sciences Indiana University South Bend South Bend IN 46634 United States Tandy School of Computer Science University of Tulsa Tulsa OK 74104 United States
In the near future, clouds will provide situational monitoring services using streaming data. Examples of such services include health monitoring, stock market monitoring, shopping cart monitoring, and emergency contr... 详细信息
来源: 评论
Ensuring continuous compliance through reconciling policy with usage  13
Ensuring continuous compliance through reconciling policy wi...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Chari, Suresh Molloy, Ian Park, Youngja Teiken, Wilfried IBM T.J. Watson Research Yorktown Heights NY United States
Organizations rarely define formal security properties or policies for their access control systems, often choosing to react to changing needs. This paper addresses the problem of reconciling entitlement usage with co... 详细信息
来源: 评论
Panel on granularity in access control  13
Panel on granularity in access control
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Molloy, Ian Tripunitara, Mahesh Lotz, Volkmar Kuhlmann, Martin Schaufler, Casey Atluri, Vijay IBM Research TJ Watson United States University of Waterloo Canada SAP Global Research Canada Omada Canada Intel Open Source Technology Center Canada Rutgers University United States
This panel will address the following question. Does an increase in the granularity of access control systems produce a measurable reduction in risk and help meet the goals of the organization, or is the cost prohibit... 详细信息
来源: 评论
Searching over encrypted data in cloud systems  13
Searching over encrypted data in cloud systems
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Kerschbaum, Florian SAP Research Karlsruhe Germany
Security is still a major inhibitor of cloud computing. When companies are testing cloud applications, e.g. for storage or databases, they use generated data for fear of data loss. Modern encrypted databases where the... 详细信息
来源: 评论