咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是291-300 订阅
排序:
An Efficient Framework for User Authorization Queries in RBAC Systems  09
An Efficient Framework for User Authorization Queries in RBA...
收藏 引用
14th acm symposium on access control models and technologies
作者: Wickramaarachchi, Guneshi T. Qardaji, Wahbeh H. Li, Ninghui Purdue Univ Lafayette IN 47907 USA
The User Authorization Query (UAQ) Problem for RBAC, introduced by Zhang and Joshi [9], is to determine the set of roles to be activated in a single session for a particular set of permissions requested by the user. T... 详细信息
来源: 评论
Ensuring Spatio-Temporal access control for Real-World Applications  09
Ensuring Spatio-Temporal Access Control for Real-World Appli...
收藏 引用
14th acm symposium on access control models and technologies
作者: Toahchoodee, Manachai Ray, Indrakshi Anastasakis, Kyriakos Georg, Geri Bordbar, Behzad Colorado State Univ Dept Comp Sci Ft Collins CO 80523 USA
Traditional access control models, such as Role-Based access control (RBAC), do not take into account contextual information, such as location and time, for making access decisions. Consequently, they are inadequate f... 详细信息
来源: 评论
Working Set-Based access control for Network File Systems  09
Working Set-Based Access Control for Network File Systems
收藏 引用
14th acm symposium on access control models and technologies
作者: Smaldone, Stephen Ganapathy, Vinod Iftode, Liviu Rutgers The State University of New Jersey Piscataway NJ USA
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal home computers and mobile devices, such as ... 详细信息
来源: 评论
Symbolic Reachability Analysis for Parameterized Administrative Role Based access control  09
Symbolic Reachability Analysis for Parameterized Administrat...
收藏 引用
14th acm symposium on access control models and technologies
作者: Stoller, Scott D. Yang, Ping Gofman, Mikhail Ramakrishnan, C. R. SUNY Stony Brook Dept Comp Sci Stony Brook NY USA
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role based access control (ARBAC) policy spec... 详细信息
来源: 评论
proceedings of eighth acm symposium on access control models and technologies
Proceedings of Eighth ACM Symposium on Access Control Models...
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
The proceedings contains 23 papers. Topics discussed include enterprise role administration, contraints, role based access control for collaborative environments, access control models and mechanisms, role engineering... 详细信息
来源: 评论
access control Policy Combining: Theory Meets Practice  09
Access Control Policy Combining: Theory Meets Practice
收藏 引用
14th acm symposium on access control models and technologies
作者: Li, Ninghui Wang, Qihua Qardaji, Wahbeh Bertino, Elisa Rao, Prathima Lobo, Jorge Lin, Dan Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Many access control policy languages, e.g., XacmL, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the results of the sub-policies according to som... 详细信息
来源: 评论
xDomain: Cross-border Proofs of access  09
xDomain: Cross-border Proofs of Access
收藏 引用
14th acm symposium on access control models and technologies
作者: Bauer, Lujo Jia, Limin Reiter, Michael K. Swasey, David Carnegie Mellon Univ Pittsburgh PA 15213 USA
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy - a technique called proof-carrying authoriz... 详细信息
来源: 评论
A Formal Framework to Elicit Roles with Business Meaning in RBAC Systems  09
A Formal Framework to Elicit Roles with Business Meaning in ...
收藏 引用
14th acm symposium on access control models and technologies
作者: Colantonio, Alessandro Di Pietro, Roberto Ocello, Alberto Verde, Nino Vincenzo Engiweb Secur Rome Italy
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered by RBAC, the role engineering disciplin... 详细信息
来源: 评论
Trojan Horse Resistant Discretionary access control  09
Trojan Horse Resistant Discretionary Access Control
收藏 引用
14th acm symposium on access control models and technologies
作者: Mao, Ziqing Li, Ninghui Chen, Hong Jiang, Xuxian Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Modem operating systems primarily use Discretionary access control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandatory access control (MAC) systems, but ar... 详细信息
来源: 评论
Dynamic Mandatory access control for Multiple Stakeholders  09
Dynamic Mandatory Access Control for Multiple Stakeholders
收藏 引用
14th acm symposium on access control models and technologies
作者: Rao, Vikhyath Jaeger, Trent Penn State Univ Syst & Internet Infrastruct Secur Lab University Pk PA 16802 USA
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging open cell phone system environment, many devices... 详细信息
来源: 评论