咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是341-350 订阅
排序:
A Posteriori Compliance control  07
A Posteriori Compliance Control
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Etalle, Sandro Winsborough, William H. Univ Twente Enschede Netherlands
While preventative policy enforcement mechanisms can provide theoretical guarantees that policy is correctly enforced, they have limitations in practice. They are inflexible when unanticipated circumstances arise, and... 详细信息
来源: 评论
Distributed access control: A Privacy-conscious Approach  07
Distributed Access Control: A Privacy-conscious Approach
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Cautis, Bogdan INRIA Futurs Futurs Italy
With more and more information being exchanged or published on the Web or in peer-to-peer, and with the significant growth in numbers of distributed, heterogeneous data sources, issues like access control and data pri... 详细信息
来源: 评论
Towards a VMM-based Usage control Framework for OS Kernel Integrity Protection  07
Towards a VMM-based Usage Control Framework for OS Kernel In...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Xu, Min Jiang, Xuxian Sandhu, Ravi Zhang, Xinwen George Mason Univ Fairfax VA 22030 USA
Protecting kernel integrity is one of the fundamental security objectives in building a trustworthy operating system (OS). For this end, a variety of approaches and systems have been proposed and developed. However, a... 详细信息
来源: 评论
Mesh: Secure, Lightweight Grid Middleware Using Existing SSH Infrastructure  07
Mesh: Secure, Lightweight Grid Middleware Using Existing SSH...
收藏 引用
12th acm symposium on access control models and technologies (SacmAT 2007)
作者: Kolano, Paul Z. NASA Ames Res Ctr Adv Supercomp Div Moffett Field CA 94035 USA
Grid computing promises gains in effective computational power. resource utilization, and resource accessibility, but in order to achieve these gains. organizations must deploy grid middleware that, in most cases. doe... 详细信息
来源: 评论
GEO-RBAC: A spatially aware RBAC  05
GEO-RBAC: A spatially aware RBAC
收藏 引用
10th acm symposium on access control models and technologies
作者: Damiani, Maria Luisa Bertino, Elisa Catania, Barbara Perlasca, Paolo Univ Milan Dipartimento Informat & Comunicaz I-20135 Milan Italy Ecole Polytech Fed Lausanne IC LBD CH-1015 Lausanne Switzerland Univ Genoa Dipartimento Informat & Sci Informat I-16146 Genoa Italy Purdue Univ CERIAS CS Dept W Lafayette IN 47907 USA Purdue Univ ECE Sch W Lafayette IN 47907 USA
Securing access to data in location- based services and mobile applications requires the definition of spatially aware access- control systems. Even if some approaches have already been proposed either in the context ... 详细信息
来源: 评论
Threshold-based Collaborative access control (T-CAC)
Threshold-based Collaborative Access Control (T-CAC)
收藏 引用
International symposium on Collaborative technologies and Systems
作者: Alsulaiman, Fawaz A. Miege, Alexandre El Saddik, Abdulmotaleb Univ Ottawa Sch Informat Technol & Engn MCR Lab Ottawa ON Canada
User's information confidentiality, and privacy rise with the increased usage of computers by various organizations. Abuse of privileges might occur when the trust is based on a single person. Moreover, access con... 详细信息
来源: 评论
Towards a resource-safe Erlang
Towards a resource-safe Erlang
收藏 引用
International symposium on Collaborative technologies and Systems
作者: Teller, David Fac Sci Lab Informat Fondamentale Orleans F-18028 Bourges France
Slowly but surely, industry is discovering the need for programming languages, runtime environments and methodologies adapted to collaborative and distributed computing platforms. However, current distributed platform... 详细信息
来源: 评论
Session details: access control in novel systems  07
Session details: Access control in novel systems
收藏 引用
proceedings of the 12th acm symposium on access control models and technologies
作者: E. Bertino Purdue University
No abstract available.
来源: 评论
Session details: Short papers: access control  07
Session details: Short papers: access control
收藏 引用
proceedings of the 12th acm symposium on access control models and technologies
作者: E. Ferrari University of Insubria at Varese
No abstract available.
来源: 评论
Session details: Novel access control techniques  07
Session details: Novel access control techniques
收藏 引用
proceedings of the 12th acm symposium on access control models and technologies
作者: T. Jaeger The Pennsylvania State University
No abstract available.
来源: 评论