咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是271-280 订阅
排序:
Capability-Based Delegation Model in RBAC
Capability-Based Delegation Model in RBAC
收藏 引用
15th acm symposium on access control models and technologies
作者: Hasebe, Koji Mabuchi, Mitsuhiro Matsushita, Akira Univ Tsukuba Grad Sch Syst & Informat Engn Tsukuba Ibaraki 3058573 Japan
For flexible and dynamic resource management in environments where users collaborate to fulfill their common tasks, various attempts at modeling delegation of authority have been proposed using the role-based access c... 详细信息
来源: 评论
Enforcing Spatial Constraints for Mobile RBAC Systems
Enforcing Spatial Constraints for Mobile RBAC Systems
收藏 引用
15th acm symposium on access control models and technologies
作者: Kirkpatrick, Michael S. Bertino, Elisa Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and pervasive computing systems. However,... 详细信息
来源: 评论
Role-Based access control (RBAC) in Java via Proxy Objects using Annotations
Role-Based Access Control (RBAC) in Java via Proxy Objects u...
收藏 引用
15th acm symposium on access control models and technologies
作者: Zarnett, Jeff Tripunitara, Mahesh Lam, Patrick Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada
We propose a new approach for applying Role-Based access control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a developer) annotates methods, interfaces... 详细信息
来源: 评论
Modular Context-Aware access control for Medical Sensor Networks
Modular Context-Aware Access Control for Medical Sensor Netw...
收藏 引用
15th acm symposium on access control models and technologies
作者: Garcia-Morchon, Oscar Wehrle, Klaus Philips Research Europe Distributed Sensor Systems Germany RWTH Aachen University Distributed Systems Germany
Medical sensor networks allow for pervasive health monitoring of users in hospitals, at home, or on the way. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that unauth... 详细信息
来源: 评论
Towards Analyzing Complex Operating System access control Configurations
Towards Analyzing Complex Operating System Access Control Co...
收藏 引用
15th acm symposium on access control models and technologies
作者: Chen, Hong Li, Ninghui Gates, Christopher S. Mao, Ziqing Center for Education and Research in Information Assurance and Security Department of Computer Science Purdue University West Lafayette IN 47907 United States Knight Capital Group United States Facebook United States
An operating system relies heavily on its access control mechanisms to defend against local and remote attacks. The complexities of modern access control mechanisms and the scale of possible configurations are often o... 详细信息
来源: 评论
StateMiner: An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy
StateMiner: An Efficient Similarity-Based Approach for Optim...
收藏 引用
15th acm symposium on access control models and technologies
作者: Takabi, Hassan Joshi, James B. D. Univ Pittsburgh Sch Informat Sci Pittsburgh PA 15260 USA
Recently, there is a growing trend of organizations migrating to RBAC because of the economic benefits that RBAC provides, and the ease of administration. In order to deploy an RBAC system, one requires to first ident... 详细信息
来源: 评论
An Architecture for Enforcing End-to-End access control Over Web Applications
An Architecture for Enforcing End-to-End Access Control Over...
收藏 引用
15th acm symposium on access control models and technologies
作者: Hicks, Boniface Rueda, Sandra King, Dave Moyer, Thomas Schiffman, Joshua Sreenivasan, Yogesh McDaniel, Patrick Jaeger, Trent Penn State Univ Dept Comp Sci & Engn Syst & Internet Infrastruct Secur Lab University Pk PA 16802 USA
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from multiple applications originating at ... 详细信息
来源: 评论
Automated Management of Network access control from Design to Enforcement  10
Automated Management of Network Access Control from Design t...
收藏 引用
15th acm symposium on access control models and technologies
作者: Al-Shaer, Ehab Univ N Carolina Charlotte Sch Comp & Informat Charlotte NC USA
Recent studies show that more than 65% of the network vulnerabilities are due to misconfigured network access control. Arbor Networks in their ISP survey shows that managing access control is the top challenge in ISP ...
来源: 评论
SacmAT'09 - proceedings of the 14th acm symposium on access control models and technologies
SACMAT'09 - Proceedings of the 14th ACM Symposium on Access ...
收藏 引用
14th acm symposium on access control models and technologies, SacmAT 2009
The proceedings contain 24 papers. The topics discussed include: safety in discretionary access control for logic-based publish-subscribe systems;ensuring spatio-temporal access control for real-world applications;an ...
来源: 评论
New access models for healthcare  10
New access models for healthcare
收藏 引用
proceedings of the 15th acm symposium on access control models and technologies
作者: Tyrone Grandison Healthcare Transformation IBM Services Research Hawthorne NY USA
Currently, there is a convergence of three key factors in the global landscape that creates an opportunity for the research community to make fundamental contributions to improving the quality of life of every single ... 详细信息
来源: 评论