咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是261-270 订阅
排序:
Session details: Data flow and access control  11
Session details: Data flow and access control
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Elisa Bertino Purdue University
No abstract available.
来源: 评论
Usable access control for all  11
Usable access control for all
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Robert W. Reeder Microsoft Redmond WA USA
No abstract available.
来源: 评论
Session details: Distributed processing and access control  11
Session details: Distributed processing and access control
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: Murat Kantarcioglu University of Texas at Dallas
No abstract available.
来源: 评论
Session details: Logic programming based access control specification  11
Session details: Logic programming based access control spec...
收藏 引用
proceedings of the 16th acm symposium on access control models and technologies
作者: David Basin ETH Zurich
No abstract available.
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
proceedings of acm symposium on access control models and technologies, SacmAT 2010年 iii页
作者: Joshi, James Carminati, Barbara University of Pittsburgh United States University of Insubria Italy
来源: 评论
Personalizing access control by Generalizing access control
Personalizing Access Control by Generalizing Access Control
收藏 引用
15th acm symposium on access control models and technologies
作者: Barker, Steve Kings Coll London Dept Comp Sci London WC2A 2LS England
We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control... 详细信息
来源: 评论
Monitoring Security Policies with Metric First-order Temporal Logic
Monitoring Security Policies with Metric First-order Tempora...
收藏 引用
15th acm symposium on access control models and technologies
作者: Basin, David Klaedtke, Felix Mueller, Samuel Swiss Fed Inst Technol Zurich Switzerland
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how a wide variety of security policies can... 详细信息
来源: 评论
An access control Model for Mobile Physical Objects
An Access Control Model for Mobile Physical Objects
收藏 引用
15th acm symposium on access control models and technologies
作者: Kerschbaum, Florian SAP Res Karlsruhe Germany
access to distributed databases containing tuples collected about mobile physical objects requires information about the objects' trajectories. Existing access control models cannot encode this information efficie... 详细信息
来源: 评论
A Card Requirements Language Enabling Privacy-Preserving access control
A Card Requirements Language Enabling Privacy-Preserving Acc...
收藏 引用
15th acm symposium on access control models and technologies
作者: Camenisch, Jan Moedersheim, Sebastian Neven, Gregory Preiss, Franz-Stefan Sommer, Dieter IBM Res Zurich Zurich Switzerland
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online resources, even though existing techn... 详细信息
来源: 评论
access control Policy Translation and Verification within Heterogeneous Data Federations
Access Control Policy Translation and Verification within He...
收藏 引用
15th acm symposium on access control models and technologies
作者: Leighton, Gregory Barbosa, Denilson Univ Alberta Dept Comp Sci Edmonton AB Canada
Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local ide... 详细信息
来源: 评论