咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是361-370 订阅
排序:
Key management for non-tree access hierarchies  06
Key management for non-tree access hierarchies
收藏 引用
11th acm symposium on access control models and technologies, SacmAT 2006
作者: Atallah, Mikhail J. Blanton, Marina Frikken, Keith B. Department of Computer Science Purdue University United States
access hierarchies are useful in many applications and are modeled as a set of access classes organized by a partial order. A user who obtains access to a class in such a hierarchy is entitled to access objects stored... 详细信息
来源: 评论
Quorum placement in networks: Minimizing network congestion
Quorum placement in networks: Minimizing network congestion
收藏 引用
25th Annual acm symposium on Principles of Distributed Computing 2006
作者: Golovin, Daniel Gupta, Anupam Maggs, Bruce M. Oprea, Florian Reiter, Michael K. Computer Science Department Carnegie Mellon University Pittsburgh PA United States Electrical and Computer Engineering Department Carnegie Mellon University Pittsburgh PA United States Akamai Technologies Cambridge MA United States
A quorum system over a universe of logical elements is a collection of subsets (quorums) of elements, any two of which intersect. In numerous distributed algorithms, the elements of the universe reside on the nodes of... 详细信息
来源: 评论
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems  06
TrustBAC: integrating trust relationships into the RBAC mode...
收藏 引用
proceedings of the eleventh acm symposium on access control models and technologies
作者: Sudip Chakraborty Indrajit Ray Colorado State University Fort Collins CO
Conventional access control are suitable for regulating access to resources by known ***,these models have often found to be inadequate for open and decentralized multi-centric systems where the user population is dyn... 详细信息
来源: 评论
Secure resource description framework: an access control model  06
Secure resource description framework: an access control mod...
收藏 引用
proceedings of the eleventh acm symposium on access control models and technologies
作者: Amit Jain Csilla Farkas University of South Carolina Columbia SC
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing eXtensible Markup Language (XML) docume... 详细信息
来源: 评论
SacmAT 2005: proceedings of 10th acm symposium on access control models and technologies
SACMAT 2005: Proceedings of 10th ACM Symposium on Access Con...
收藏 引用
SacmAT 2005: proceedings of 10th acm symposium on access control models and technologies
The proceedings contain 19 papers. The topics discussed include: integrity constraints in trust management;declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastruc... 详细信息
来源: 评论
Traust: a trust negotiation-based authorization service for open systems  06
Traust: a trust negotiation-based authorization service for ...
收藏 引用
proceedings of the eleventh acm symposium on access control models and technologies
作者: Adam J. Lee Marianne Winslett Jim Basney Von Welch University of Illinois at Urbana-Champaign Urbana IL
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizational boundaries. Researchers have shown t... 详细信息
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
proceedings of acm symposium on access control models and technologies, SacmAT 2005年 iii页
作者: Ferrari, Elena Ahn, Gail-Joon
No abstract available
来源: 评论
Future direction of access control models, architectures, and technologies  05
Future direction of access control models, architectures, an...
收藏 引用
SacmAT 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Beznosov, Konstantin University of British Columbia Canada
No abstract available
来源: 评论
Verifiable composition of access control and application features  05
Verifiable composition of access control and application fea...
收藏 引用
SacmAT 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Song, Eunjee Reddy, Raghu France, Robert Ray, Indrakshi Georg, Geri Alexander, Roger Computer Science Dept. Colorado State University Fort Collins CO 80523
access control features are often spread across and tangled with other functionality in a design. This makes modifying and replacing these features in a design difficult. Aspect-oriented modeling (AOM) techniques can ... 详细信息
来源: 评论
Peer-to-peer access control architecture using trusted computing technology  05
Peer-to-peer access control architecture using trusted compu...
收藏 引用
SacmAT 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Sandhu, Ravi Zhang, Xinwen George Mason University
It has been recognized for some lime that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard trusted computing technologies promis... 详细信息
来源: 评论