咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是241-250 订阅
排序:
Session details: access control for mobile devices and social networks  12
Session details: Access control for mobile devices and socia...
收藏 引用
proceedings of the 17th acm symposium on access control models and technologies
作者: Ian Molloy IBM Research
No abstract available.
来源: 评论
Session details: Role-based access control  12
Session details: Role-based access control
收藏 引用
proceedings of the 17th acm symposium on access control models and technologies
作者: Axel Kern Beta Systems Software AG
No abstract available.
来源: 评论
Hardware-enhanced access control for cloud computing  12
Hardware-enhanced access control for cloud computing
收藏 引用
proceedings of the 17th acm symposium on access control models and technologies
作者: Ruby B. Lee Princeton University Princeton NJ USA
Future trustworthy computer systems should provide built-in support for at least the cornerstone security properties of confidentiality, integrity and availability. access control can help significantly towards achiev... 详细信息
来源: 评论
access control for a federated police information system  11
Access control for a federated police information system
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Hudnall, Matthew Mitchell, Maury Parrish, Allen Center for Advanced Public Safety University of Alabama Tuscaloosa AL 35487-0290 United States Alabama Criminal Justice Info. Center 201 South Union Street Montgomery AL 36130 United States
In this paper, we present the elements of a system for demonstration that supports a federated infrastructure for a collection of police agencies. © 2011 acm.
来源: 评论
xfACL: An extensible functional language for access control  11
xfACL: An extensible functional language for access control
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Ni, Qun Bertino, Elisa Department of Computer Science Purdue University W. Lafayette IN 47906 United States
The main goal of modern access control policy languages is to offer high-level languages, by using which security officers and application developers can express a large variety of access restrictions and isolate the ... 详细信息
来源: 评论
SEAL: A logic programming framework for specifying and verifying access control models  11
SEAL: A logic programming framework for specifying and verif...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Naldurg, Prasad Raghavendra, K.R. Microsoft Research India Bangalore India Indian Institute of Science Bangalore India
We present SEAL, a language for specification and analysis of safety properties for label-based access control systems. A SEAL program represents a possibly infinite-state non-deterministic transition system describin... 详细信息
来源: 评论
Relationship-based access control policies and their policy languages  11
Relationship-based access control policies and their policy ...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Fong, Philip W.L. Siahaan, Ida Department of Computer Science University of Calgary Calgary AL Canada
The Relationship-Based access control (ReBAC) model was recently proposed as a general-purpose access control model. It supports the natural expression of parameterized roles, the composition of policies, and the dele... 详细信息
来源: 评论
Detecting and Resolving Policy Misconfigurations in access-control Systems  08
Detecting and Resolving Policy Misconfigurations in Access-C...
收藏 引用
13th acm symposium on access control models and technologies
作者: Bauer, Lujo Garriss, Scott Reiter, Michael K. Carnegie Mellon Univ Pittsburgh PA 15213 USA Google Mountain View CA 94043 USA Univ N Carolina Dept Comp Sci Chapel Hill NC 27599 USA
access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration, and, in the context of particular applications (e. g., health care), very severe conseq... 详细信息
来源: 评论
Anomaly discovery and resolution in Web access control policies  11
Anomaly discovery and resolution in Web access control polic...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Hu, Hongxin Ahn, Gail-Joon Kulkarni, Ketan Arizona State University Tempe AZ 85287 United States
The advent of emerging technologies such asWeb services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from un... 详细信息
来源: 评论
Program synthesis in administration of higher-order permissions  11
Program synthesis in administration of higher-order permissi...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Bruns, Glenn Huth, Michael Avijit, Kumar Bell Labs Alcatel-Lucent United States Imperial College London United Kingdom Carnegie Mellon University United States
In "administrative" access control, policy controls permissions not just on application actions, but also on actions to modify permissions, on actions to modify permissions on those actions, and so on. One c... 详细信息
来源: 评论