咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是221-230 订阅
排序:
Mobile security and privacy: The quest for the mighty access control  13
Mobile security and privacy: The quest for the mighty access...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Sadeghi, Ahmad-Reza CASED/System Security Lab. Technische Universität Darmstadt Germany TU-Darmstadt Germany Darmstadt Germany
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end-users. Mobile applications (apps) provide flexible access to critical services such as online banking, health record... 详细信息
来源: 评论
SacmAT'12 - proceedings of the 17th acm symposium on access control models and technologies
SACMAT'12 - Proceedings of the 17th ACM Symposium on Access ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
The proceedings contain 27 papers. The topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for access control policies: applications to role mining over logs wi...
来源: 评论
Towards a policy enforcement infrastructure for distributed usage control  12
Towards a policy enforcement infrastructure for distributed ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Kelbert, Florian Pretschner, Alexander Karlsruhe Institute of Technology Am Fasanengarten 5 Karlsruhe Germany
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an applica... 详细信息
来源: 评论
Encryption-enforced access control for an RFID Discovery Service  12
Encryption-enforced access control for an RFID Discovery Ser...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Kerschbaum, Florian Chaves, Leonardo Weiss Ferreira Department of Privacy and Data Security Technical University Dresden Germany SAP AG SAP Research Center Karlsruhe Germany
In this demonstration we present a novel encryption scheme for enforcing access control in a Discovery Service. A Discovery Service is a piece of software that allows one to "discover" item-level data which ... 详细信息
来源: 评论
A model-based approach to automated testing of access control policies  12
A model-based approach to automated testing of access contro...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Xu, Dianxiang Thomas, Lijo Kent, Michael Mouelhi, Tejeddine Le Traon, Yves National Center for the Protection of the Financial Infrastructure Dakota State University Madison SD 57042 United States Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg Campus Kirchberg L-1359 Luxembourg
access control policies in software systems can be implemented incorrectly for various reasons. This paper presents a model-based approach for automated testing of access control implementation. To feed the model-base... 详细信息
来源: 评论
SCUTA: A server-side access control system for web applications  12
SCUTA: A server-side access control system for web applicati...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Tan, Xi Du, Wenliang Luo, Tongbo Soundararaj, Karthick D. Dept. of Electrical Engineering and Computer Science Syracuse University Syracuse NY United States
The Web is playing a very important role in our lives, and is becoming an essential element of the computing infrastructure. Unfortunately, its importance makes it the preferred target of attacks. Web-based vulnerabil... 详细信息
来源: 评论
Practical risk aggregation in RBAC models  12
Practical risk aggregation in RBAC models
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Chari, Suresh Lobo, Jorge Molloy, Ian IBM Research TJ Watson Hawthorne NY United States
This paper describes our system, built as part of a commercially available product, for inferring the risk in an RBAC policy model, i.e., the assignment of permissions to roles and roles to users. Our system implement... 详细信息
来源: 评论
PlexC: A policy language for exposure control  12
PlexC: A policy language for exposure control
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Le Gall, Yann Lee, Adam J. Kapadia, Apu Department of Computer Science University of Pittsburgh Pittsburgh PA United States School of Informatics and Computing Indiana University Bloomington Bloomington IN United States
With the widespread use of online social networks and mobile devices, it is not uncommon for people to continuously broadcast contextual information such as their current location or activity. These technologies prese... 详细信息
来源: 评论
Analyzing temporal role based access control models  12
Analyzing temporal role based access control models
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Uzun, Emre Atluri, Vijayalakshmi Sural, Shamik Vaidya, Jaideep Parlato, Gennaro Ferrara, Anna Lisa Madhusudan, P. Rutgers University United States Indian Institute of Technology India University of Southampton United Kingdom University of Bristol United Kingdom University of Illinois at Urbana-Champaign United States
Today, Role Based access control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes. Several extensions to the authorization as well as the admini... 详细信息
来源: 评论
SecureBPMN: Modeling and enforcing access control requirements in business processes  12
SecureBPMN: Modeling and enforcing access control requiremen...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Brucker, Achim D. Hang, Isabelle Lückemeyer, Gero Ruparel, Raj SAP Research Vincenz-Priessnitz-Str. 1 76131 Karlsruhe Germany Hochschule für Technik Stuttgart Schellingstr. 24 70174 Stuttgart Germany
Modern enterprise systems have to comply to regulations such as Basel III resulting in complex security requirements. These requirements need to be modeled at design-time and enforced at runtime. Moreover, modern ente... 详细信息
来源: 评论