咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是251-260 订阅
排序:
xDAuth: A scalable and lightweight framework for cross domain access control and delegation  11
xDAuth: A scalable and lightweight framework for cross domai...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Alam, Masoom Zhang, Xinwen Khan, Kamran H Ali, Gohar Security Engineering Research Group IMSciences United States Huawei America Research Center Santa Clara CA United States
Cross domain resource sharing and collaborations have be- come pervasive in today's service oriented organizations. Existing approaches for the realization of cross domain access control are either focused on the ... 详细信息
来源: 评论
An authorization scheme for version control systems  11
An authorization scheme for version control systems
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Chamarty, Sitaram Patel, Hiren D. Tripunitara, Mahesh V. Tata Consultancy Services Hyderabad India ECE Department Univ. of Waterloo Canada
We present gitolite, an authorization scheme for Version control Systems (VCSes). We have implemented it for the Git VCS. A VCS enables versioning, distributed collaboration and several other features, and is an impor... 详细信息
来源: 评论
Rumpole: A flexible break-glass access control model  11
Rumpole: A flexible break-glass access control model
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Marinovic, Srdjan Craven, Robert Ma, Jiefei Dulay, Naranker Department of Computing Imperial College London United Kingdom
access control operates under the assumption that it is possible to correctly encode and predict all subjects' needs and rights. However, in human-centric pervasive domains, such as health care, it is hard if not ... 详细信息
来源: 评论
System for automatic estimation of data sensitivity with applications to access control and other applications  11
System for automatic estimation of data sensitivity with app...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Park, Youngja Gates, Stephen C. Teiken, Wilfried Chari, Suresh N. IBM T. J. Watson Research Center P.O. Box 704 Yorktown Heights NY 10598 United States
The Enterprise Information Security Management (EISM) system aims to semi-automatically estimate the sensitivity of enterprise data through advanced content analysis and business process mining. We demonstrate a proof... 详细信息
来源: 评论
An approach to modular and testable security models of real-world health-care applications  11
An approach to modular and testable security models of real-...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Brucker, Achim D. Brügger, Lukas Kearney, Paul Wolff, Burkhart SAP Research Vincenz-Priessnitz-Str. 1 76131 Karlsruhe Germany Information Security ETH Zurich 8092 Zurich Switzerland Security Futures Practice BT Innovate and Design Adastral Park Ipswich United Kingdom Parc Club Orsay Universit´ Université Paris-Sud 91893 Orsay Cedex France
We present a generic modular policy modelling framework and instantiate it with a substantial case study for modelbased testing of some key security mechanisms of applications and services of the NPfIT. NPfIT, the Nat... 详细信息
来源: 评论
Modeling data flow in socio-information networks: A risk estimation approach  11
Modeling data flow in socio-information networks: A risk est...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Wang, Ting Srivatsa, Mudhakar Agrawal, Dakshi Liu, Ling College of Computing Georgia Institute of Technology Atlanta GA United States IBM T.J. Watson Research Center Hawthorne NY United States
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) - some of whom may be controlled by malicious insiders - often leads to unpredicted access control risk... 详细信息
来源: 评论
Data leakage mitigation for discretionary access control in collaboration clouds  11
Data leakage mitigation for discretionary access control in ...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Wang, Qihua Jin, Hongxia IBM Almaden Research Center San Jose CA United States
With the growing popularity of cloud computing, more and more enterprises are migrating their collaboration platforms from inenterprise systems to Software as a Service (SaaS) applications. While SaaS collaboration ha... 详细信息
来源: 评论
Data-centric multi-layer usage control enforcement: A social network example  11
Data-centric multi-layer usage control enforcement: A social...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Lovat, Enrico Pretschner, Alexander Karlsruhe Institute of Technology Karlsruhe Germany
Usage control is concerned with how data is used after access to it has been granted. Data may exist in multiple representations which potentially reside at different layers of abstraction, including operating system,... 详细信息
来源: 评论
An integrated approach for identity and access management in a SOA context  11
An integrated approach for identity and access management in...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Hummer, Waldemar Gaubatz, Patrick Strembeck, Mark Zdun, Uwe Dustdar, Schahram Distributed Systems Group Information Systems Institute Vienna University of Technology Austria Software Architecture Group Faculty of Computer Science University of Vienna Austria Information Systems Institute Vienna University of Economics and Business Austria
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we defined a domainspecific language (DSL) fo... 详细信息
来源: 评论
SacmAT'10 - proceedings of the 15th acm symposium on access control models and technologies
SACMAT'10 - Proceedings of the 15th ACM Symposium on Access ...
收藏 引用
15th acm symposium on access control models and technologies, SacmAT 2010
The proceedings contain 19 papers. The topics discussed include: a model of triangulating environments for policy authoring;towards analyzing complex operating system access control configurations;monitoring security ...
来源: 评论