咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是281-290 订阅
排序:
proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
proceedings of acm symposium on access control models and technologies, SacmAT 2009年 iii页
作者: Carminati, Barbara Joshi, James University of Insubria Italy University of Pittsburgh United States
来源: 评论
Spatio-temporal access control: Challenges and Applications
Spatio-temporal Access Control: Challenges and Applications
收藏 引用
14th acm symposium on access control models and technologies
作者: Damiani, Maria Luisa Martin, Herve Saygin, Yucel Spada, Maria Rita Ulmer, Cedric Univ Milan I-20122 Milan Italy
In the last few years, a number of spatial and spatio-temporal access control models have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effectiv... 详细信息
来源: 评论
The Next 700 access control models or a Unifying Meta-Model?  09
The Next 700 Access Control Models or a Unifying Meta-Model?
收藏 引用
14th acm symposium on access control models and technologies
作者: Barker, Steve Kings Coll London Dept Comp Sci London WC2A 2LS England
We address some fundamental questions, which were raised by Atluri and Ferraiolo at SacmAT'08, on the prospects for and benefits of a meta-model of access control. We demonstrate that a meta-model for access contr... 详细信息
来源: 评论
Usability Meets access control: Challenges and Research Opportunities  09
Usability Meets Access Control: Challenges and Research Oppo...
收藏 引用
14th acm symposium on access control models and technologies
作者: Beznosov, Konstantin Inglesant, Philip Lobo, Jorge Reeder, Rob Zurko, Mary Ellen Univ British Columbia Vancouver BC V5Z 1M9 Canada
This panel discusses specific challenges in the usability of access control technologies and new opportunities for research. The questions vary from "Why nobody, even experts, uses access control lists (ACLs)?&qu... 详细信息
来源: 评论
Extending access control models with Break-glass  09
Extending Access Control Models with Break-glass
收藏 引用
14th acm symposium on access control models and technologies
作者: Brucker, Achim D. Petritsch, Helmut SAP Res D-76131 Karlsruhe Germany
access control models are usually static, i.e., permissions are granted based on a policy that only changes seldom. Especially for scenarios in health care and disaster management, a more flexible support of access co... 详细信息
来源: 评论
Automating Role-based Provisioning by Learning from Examples  09
Automating Role-based Provisioning by Learning from Examples
收藏 引用
14th acm symposium on access control models and technologies
作者: Ni, Qun Lobo, Jorge Calo, Seraphin Rohatgi, Pankaj Bertino, Elisa Purdue Univ W Lafayette IN 47907 USA
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existing roles to entitlements from newly dep... 详细信息
来源: 评论
Efficient access Enforcement in Distributed Role-Based access control (RBAC) Deployments  09
Efficient Access Enforcement in Distributed Role-Based Acces...
收藏 引用
14th acm symposium on access control models and technologies
作者: Tripunitara, Mahesh V. Carbunar, Bogdan Univ Waterloo ECE Dept Waterloo ON N2L 3G1 Canada
We address the distributed setting for enforcement of a centralized Role-Based access control (RBAC) protection state. We present a new approach for time- and space-efficient access enforcement. Underlying our approac... 详细信息
来源: 评论
A Semantic Web Based Framework for Social Network access control  09
A Semantic Web Based Framework for Social Network Access Con...
收藏 引用
14th acm symposium on access control models and technologies
作者: Carminati, Barbara Ferrari, Elena Heatherly, Raymond Kantarcioglu, Murat Thurainsingham, Bhavani Univ Insubria Varese Italy
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community organization. On the other hand, securit... 详细信息
来源: 评论
An Algebra for Fine-Grained Integration of XacmL Policies  09
An Algebra for Fine-Grained Integration of XACML Policies
收藏 引用
14th acm symposium on access control models and technologies
作者: Rao, Prathima Lin, Dan Bertino, Elisa Li, Ninghui Lobo, Jorge Purdue Univ W Lafayette IN 47907 USA
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to su... 详细信息
来源: 评论
Safety in Discretionary access control for Logic-based Publish-Subscribe Systems  09
Safety in Discretionary Access Control for Logic-based Publi...
收藏 引用
14th acm symposium on access control models and technologies
作者: Minami, Kazuhiro Borisov, Nikita Gunter, Carl A. Univ Illinois Urbana IL 61801 USA
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the privacy of sensitive information, such a... 详细信息
来源: 评论