咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是321-330 订阅
排序:
Fast Exact and Heuristic Methods for Role Minimization Problems  08
Fast Exact and Heuristic Methods for Role Minimization Probl...
收藏 引用
13th acm symposium on access control models and technologies
作者: Ene, Alina Rao, Prasad Horne, William Schreiber, Robert Milosavljevic, Nikola Tarjan, Robert E. Princeton Univ Dept Comp Sci Princeton NJ 08540 USA
We describe several new bottom-up approaches to problems in role engineering for Role-Based access control (RBAC). The salient problems are all NP-complete, even to approximate, yet we find that in instances that aris... 详细信息
来源: 评论
RCWLBAC - representing role based access control in OWL
RCWLBAC - representing role based access control in OWL
收藏 引用
13th acm symposium on access control models and technologies, SacmAT'08
作者: Finin, T. Joshi, A. Kagal, L. Niu, J. Sandhu, R. Winsborough, W. Thuraisingham, B. Univ. of Maryland Baltimore United States Massachusetts Institute of Technology Univ. of Texas San Antonio United States Univ. of Texas Dallas
There have been two parallel themes in access control re-search in recent years. On the one hand there are efforts to develop new access control models to meet the policy needs of real world application domains. In pa... 详细信息
来源: 评论
Advanced Security for Virtual Organizations: The Pros and Cons of Centralized vs Decentralized Security models  08
Advanced Security for Virtual Organizations: The Pros and Co...
收藏 引用
8th IEEE International symposium on Cluster Computing and the Grid
作者: Sinnott, R. O. Chadwick, D. W. Doherty, T. Martin, D. Stell, A. Stewart, G. Su, L. Watt, J. Univ Glasgow Natl eSci Ctr Glasgow G12 8QQ Lanark Scotland Univ Kent Informat Syst Secur Grp Canterbury CT2 7NZ Kent England
Grids allow for collaborative e-Research to be undertaken, often across institutional and national boundaries. Typically this is through the establishment of virtual organizations (VOs) where policies on access and us... 详细信息
来源: 评论
SacmAT'07: proceedings of the 12th acm symposium on access control models and technologies
SACMAT'07: Proceedings of the 12th ACM Symposium on Access C...
收藏 引用
SacmAT'07: 12th acm symposium on access control models and technologies
The proceedings contain 28 papers. The topics discussed include: An approach to evaluate policy similarity;a posteriori compliance control;enforcing access control over data streams;fine-grained access control to web ... 详细信息
来源: 评论
ROWLBAC: representing role based access control in OWL  08
ROWLBAC: representing role based access control in OWL
收藏 引用
proceedings of the 13th acm symposium on access control models and technologies
作者: T. Finin A. Joshi L. Kagal J. Niu R. Sandhu W. Winsborough B. Thuraisingham Univ. of Maryland Massachusetts Institute of Technology Univ. of Texas at San Antonio Univ. of Texas Dallas
There have been two parallel themes in access control research in recent years. On the one hand there are efforts to develop new access control models to meet the policy needs of real world application domains. In par... 详细信息
来源: 评论
A note on the formalisation of UCON  07
A note on the formalisation of UCON
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Janicke, Helge Cau, Antonio Zedan, Hussein De Montfort Univ Software Technol Res Lab Leicester LE1 9BH Leics England
Usage control (UCON) models, similar to access control models, control and govern the users' access to resources and services that, are available in the system. One of the major improvements of UCON over tradition... 详细信息
来源: 评论
Action-Status access control  07
Action-Status Access Control
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Barker, Steve Kings Coll London Strand London WC2A 2LS England
We introduce a generalization of Role-based access control that we call the Action-Status access control (ASAC) model. ASAC model addresses certain shortcomings with RBAC models when applied in distributed computing c... 详细信息
来源: 评论
Enforcing access control Over Data Streams  07
Enforcing Access Control Over Data Streams
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Carminati, Barbara Ferrari, Elena Tan, Kian Lee Univ Insubria DICOM Varese Italy
access control is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study ho... 详细信息
来源: 评论
Privacy-aware Role Based access control  07
Privacy-aware Role Based Access Control
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Ni, Qun Trombetta, Alberto Bertino, Elisa Lobo, Jorge Purdue Univ W Lafayette IN 47907 USA
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of all expressive and easy-to-use privacy-related access control model, based oil... 详细信息
来源: 评论
Discretionary access control with the Administrative Role Graph Model  07
Discretionary Access Control with the Administrative Role Gr...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Wang, He Osborn, Sylvia L. Univ Western Ontario Dept Comp Sci London ON N6A 5B7 Canada
Previous research examining the mapping of discretionary access control (DAC) to role-based access control (RBAC) has considered neither ownership nor further granting of privileges. We show how to accomplish this by ... 详细信息
来源: 评论