咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是301-310 订阅
排序:
A Decision Support System for Secure Information Sharing  09
A Decision Support System for Secure Information Sharing
收藏 引用
14th acm symposium on access control models and technologies
作者: Fokoue, Achille Srivatsa, Mudhakar Rohatgi, Pankaj Wrobel, Peter Yesberg, John IBM T.J. Watson Research Center Hawthorne NY USA CESG Gloucestershire United Kingdom Defense Sciences and Technologies Laboratory London United Kingdom
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundaries. Risk optimal decisions to dissemina... 详细信息
来源: 评论
A New Security Scheme for E-health System
A New Security Scheme for E-health System
收藏 引用
International symposium on Collaborative technologies and Systems
作者: Li, Wei Hoang, Doan Univ Technol Sydney iNEXT UTS Res Ctr Innovat IT Serv & Applicat Broadway NSW 2007 Australia
Security is a critical requirement for the e-health system because the patient's sensitive information can be accessed remotely and this makes the entire system vulnerable to malicious attacks. In this paper, we p... 详细信息
来源: 评论
Session details: Trust and access control in systems  09
Session details: Trust and access control in systems
收藏 引用
proceedings of the 14th acm symposium on access control models and technologies
作者: Indrakshi Ray Colorado State University
No abstract available.
来源: 评论
SacmAT'08 - proceedings of the 13th acm symposium on access control models and technologies
SACMAT'08 - Proceedings of the 13th ACM Symposium on Access ...
收藏 引用
13th acm symposium on access control models and technologies, SacmAT'08
The proceedings contain 20 papers. The topics discussed include: fast exact and heuristic methods for role minimization problems;migrating to optimal RBAC with minimal perturbation;mining roles with semantic meanings;...
来源: 评论
Spatio-temporal access control: challenges and applications  09
Spatio-temporal access control: challenges and applications
收藏 引用
proceedings of the 14th acm symposium on access control models and technologies
作者: Maria Luisa Damiani Herve Martin Yucel Saygin Maria Rita Spada Cedric Ulmer University of Milan Milan Italy University of Grenoble Grenoble France Sabanci University Instanbul Turkey Wind Telecomunicazioni Ivrea Italy SAP Labs France SAS Sophia Antipolis France
In the last few years, a number of spatial and spatio-temporal access control models have been developed especially in the framework of pervasive computing and location-aware applications. Yet, how useful and effectiv... 详细信息
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT: Message from the steering committee chair
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
proceedings of acm symposium on access control models and technologies, SacmAT 2008年 iv页
作者: Sandhu, Ravi
No abstract available
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
proceedings of acm symposium on access control models and technologies, SacmAT 2008年 iii页
作者: Ray, Indrakshi Li, Ninghui Colorado State University Purdue University
No abstract available
来源: 评论
An Obligation Model Bridging access control Policies and Privacy Policies  08
An Obligation Model Bridging Access Control Policies and Pri...
收藏 引用
13th acm symposium on access control models and technologies
作者: Ni, Qun Bertino, Elisa Lobo, Jorge Purdue Univ W Lafayette IN 47907 USA
In this paper, we present a novel obligation model for the Core Privacy-aware Role Based access control (P-RBAC), and discuss some design issues in detail. Pre-obligations, post-obligations, conditional obligations, a... 详细信息
来源: 评论
A meta model for access control: Why is it needed and Is it even possible to achieve?  08
A meta model for access control: Why is it needed and Is it ...
收藏 引用
13th acm symposium on access control models and technologies, SacmAT'08
作者: Ferraiolo, David Atluri, Vijay National Institute of Standards and Technology Rutgers University
No abstract available
来源: 评论
Policy Decomposition for Collaborative access control  08
Policy Decomposition for Collaborative Access Control
收藏 引用
13th acm symposium on access control models and technologies
作者: Lin, Dan Rao, Prathima Li, Ninghui Bertino, Elisa Lobo, Jorge Purdue Univ W Lafayette IN 47907 USA
With the advances in web service techniques, new collaborative applications have emerged like supply chain arrangements and coalition in government agencies. In such applications, the collaborating parties are respons... 详细信息
来源: 评论