咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是311-320 订阅
排序:
Enabling Verification and Conformance Testing for access control Model  08
Enabling Verification and Conformance Testing for Access Con...
收藏 引用
13th acm symposium on access control models and technologies
作者: Hu, Hongxin Ahn, Gail-Joon Univ N Carolina Charlotte NC 28223 USA
Verification and testing are the important;step for software assurance. However, such crucial and yet challenging tasks have not been widely adopted in building access control systems. In this paper we propose a metho... 详细信息
来源: 评论
RBAC Administration in Distributed Systems  08
RBAC Administration in Distributed Systems
收藏 引用
13th acm symposium on access control models and technologies
作者: Dekker, M. A. C. Crampton, J. Etalle, S. KPMG CT The Hague Netherlands
Large and distributed access control systems are increasingly common, for example in health care. In such settings, access control policies may become very complex, thus complicating correct and efficient adminstratio... 详细信息
来源: 评论
Context-Aware Role-based access control in Pervasive Computing Systems  08
Context-Aware Role-based Access Control in Pervasive Computi...
收藏 引用
13th acm symposium on access control models and technologies
作者: Kulkarni, Devdatta Tripathi, Anand Univ Minnesota Dept Comp Sci St Paul MN 55455 USA
In this paper we present a context-aware RBAC (CA-RBAC) model for pervasive computing applications. The design of this model has been guided by the context-based access control requirements of such applications. These... 详细信息
来源: 评论
Authorization Recycling in RBAC Systems  08
Authorization Recycling in RBAC Systems
收藏 引用
13th acm symposium on access control models and technologies
作者: Wei, Qiang Beznosov, Konstantin Crampton, Jason Ripeanu, Matei Univ British Columbia LERSSE Vancouver BC V5Z 1M9 Canada
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point ... 详细信息
来源: 评论
access control by Action control  08
Access Control by Action Control
收藏 引用
13th acm symposium on access control models and technologies
作者: Barker, Steve Kings Coll London Dept Comp Sci London WC2A 2LS England
We address the problem of defining access control policies that may be used in the evaluation of requests made by client actors, in the course of e-trading, to perform actions on the resources maintained by an e-colle... 详细信息
来源: 评论
A General Obligation Model and Continuity-Enhanced Policy Enforcement Engine for Usage control  08
A General Obligation Model and Continuity-Enhanced Policy En...
收藏 引用
13th acm symposium on access control models and technologies
作者: Katt, Basel Hafner, Michael Zhang, Xinwen Breu, Ruth Seifert, Jean-Pierre Univ Innsbruck A-6020 Innsbruck Austria
The usage control model (UCON) has been proposed to augment traditional access control models by integrating authorizations, obligations, and conditions and providing the properties of decision continuity and attribut... 详细信息
来源: 评论
Enforcing Security Properties in Task-based Systems  08
Enforcing Security Properties in Task-based Systems
收藏 引用
13th acm symposium on access control models and technologies
作者: Irwin, Keith Yu, Ting Winsborough, William H. N Carolina State Univ Raleigh NC 27695 USA
Though a user's privileges are often granted based on the tasks that the user is expected to fulfill, the concept of tasks is usually not explicitly modeled in access control. We propose a system where tasks are t... 详细信息
来源: 评论
Task-Based Entailment Constraints for Basic Workflow Patterns  08
Task-Based Entailment Constraints for Basic Workflow Pattern...
收藏 引用
13th acm symposium on access control models and technologies
作者: Wolter, Christian Schaad, Andreas Meinel, Christoph SAP Res D-76131 Karlsruhe Germany
access control decisions are based on the authorisation policies defined for a system as well as observed context and behaviour when evaluating these constraints at runtime. Workflow management systems have been recog... 详细信息
来源: 评论
New constructions for provably-secure time-bound hierarchical key assignment schemes  07
New constructions for provably-secure time-bound hierarchica...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: De Santis, Alfredo Ferrara, Anna Lisa Masucci, Barbara Univ Salerno Dipartimento Informat & Applicaz I-84084 Fisciano SA Italy
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarchy can compute the... 详细信息
来源: 评论
Using Policy-based Management for Privacy-Enhancing Data access and Usage control in Grid Environments  08
Using Policy-based Management for Privacy-Enhancing Data Acc...
收藏 引用
8th IEEE International symposium on Cluster Computing and the Grid
作者: Hommel, Wolfgang Munich Network Management Team Leibniz Supercomp Ctr D-85748 Garching Germany
Preventing the misuse of personally identifiable information and preserving user privacy are key issues in the management of IT services, especially when organizational borders are crossed. In this paper we first pres... 详细信息
来源: 评论