咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是331-340 订阅
排序:
Fine-grained access control to Web Databases  07
Fine-grained Access Control to Web Databases
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Roichman, Alex Gudes, Ehud Open Univ Dept Comp Sci Raanana Israel
Before the Web era, databases were well-protected by using the standard access control techniques such as Views and SQL authorization commands. But with the development of web systems, the number of attacks oil databa... 详细信息
来源: 评论
Multilevel Filesystems in Solaris Trusted Extensions  07
Multilevel Filesystems in Solaris Trusted Extensions
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Faden, Glenn Sun Microsyst Menlo Pk CA USA
Multilevel security is typically implemented by assigning fine-grained Security contexts, such as sensitivity labels to all subjects and objects. These extended security contexts require modifications to standard file... 详细信息
来源: 评论
Role Engineering using Graph Optimisation  07
Role Engineering using Graph Optimisation
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Zhang, Dana Ramamohanarao, Kotagiri Ebringer, Tim Univ Melbourne Dept Comp Sci & Software Engn Melbourne Vic 3010 Australia
Role engineering is one of the fundamental phases for migrating existing enterprises to Role Based access control. In organisations with a large number of users and permissions, this task can be time consuming and cos... 详细信息
来源: 评论
PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based access control Framework  07
PolicyMorph: Interactive Policy Transformations for a Logica...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: LeMay, Michael Fatemieh, Omid Gunter, Carl A. Univ Illinois Dept Comp Sci Urbana IL 61801 USA
Constraint systems provide techniques for automatically analyzing the conformance of low-level access control policies to high-level business rules formalized as logical constraints. However, there are likely to be pr... 详细信息
来源: 评论
Formalizing XML access control for Update Operations  07
Formalizing XML Access Control for Update Operations
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Fundulaki, Irini Maneth, Sebastian Univ Edinburgh Edinburgh EH8 9YL Midlothian Scotland
Several languages have been proposed over the past years which support the specification of access control oil XML data. Most of these languages consider read-access restrictions only and do not deal with access right... 详细信息
来源: 评论
Using Semantics for Automatic Enforcement of access control Policies among Dynamic Coalitions  07
Using Semantics for Automatic Enforcement of Access Control ...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Warner, Janice Atluri, Vijayalakshmi Mukkamala, Ravi Vaidya, Jaideep Rutgers State Univ MSIS Dept Piscataway NJ 08855 USA
In a dynamic coalition environment, organizations should be able to exercise their own local fine-grained access control policies while sharing resources with external entities. In this paper, we propose an approach t... 详细信息
来源: 评论
An Approach to Evaluate Policy Similarity  07
An Approach to Evaluate Policy Similarity
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Lin, Dan Rao, Priathima Bertino, Elisa Lobo, Jorge Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
Recent collaborative applications and enterprises very often need to efficiently integrate their access control policies. An important step in policy integration is to analyze the similarity of policies. Existing appr... 详细信息
来源: 评论
Towards Realizing a Formal RBAC Model in Real Systems  07
Towards Realizing a Formal RBAC Model in Real Systems
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Ahn, Gail-Joon Hu, Hongxin Univ N Carolina Charlotte NC 28223 USA
There still exists an open question on how formal models can be fully realized in the system development phase. The Model Driven Development (MDD) approach has been recentlyintroduced to deal with such a critical issu... 详细信息
来源: 评论
Chinese-Wall Process Confinement for Practical Distributed Coalitions  07
Chinese-Wall Process Confinement for Practical Distributed C...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Katsuno, Yasuharu Watanabe, Yuji Furuichi, Sanehiro Kudo, Michiharu IBM Res Corp Tokyo Res Lab Yamato Shi 2428502 Japan
A distributed coalition supports distributed mandatory access controls for resources whose security policies differ for each group of components over nodes, and provides secure information operations and exchanges wit... 详细信息
来源: 评论
PEI models towards Scalable, Usable and High-Assurance Information Sharing  07
PEI Models towards Scalable, Usable and High-Assurance Infor...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Krishnan, Ram Sandhu, Ravi Ranganathan, Kumar George Mason Univ Lab Informat Secur Technol Fairfax VA 22030 USA
Secure Information Sharing (SIS) or "share but protect" is a challenging and elusive problem both because of its broad scope and complexity ranging right from conception (objective and policy) to culmination... 详细信息
来源: 评论