咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是401-410 订阅
排序:
On the role of roles: from role-based to role-sensitive access control  04
On the role of roles: from role-based to role-sensitive acce...
收藏 引用
proceedings of the ninth acm symposium on access control models and technologies
作者: Xuhui Ao Naftaly H. Minsky Rutgers University Piscataway NJ
This paper maintains that for an access-control (AC) mechanism tosupport a wide range of policies, it is best to dispense with any built-insemantics for roles in the mechanism itself---be it the semantics of RBAC, ora... 详细信息
来源: 评论
Dynamic and risk-aware network access management  03
Dynamic and risk-aware network access management
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Teo, Lawrence Ahn, Gail-Joon Zheng, Yuliang LIISP Univ. of North Carolina at Charlotte 9201 University City Blvd Charlotte NC 28223 United States Calyptix Security Corporation P.O. Box 561508 Charlotte NC 28256 United States
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to network security can be achieved if we ... 详细信息
来源: 评论
Cryptographic access control in a distributed file system  03
Cryptographic access control in a distributed file system
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Harrington, Anthony Jensen, Christian Department of Computer Science Trinity College Dublin Dublin Ireland Info. and Mathematical Modelling Technical University of Denmark Denmark
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to distribute the functionality of the re... 详细信息
来源: 评论
Dynamic access control: Preserving safety and trust for network defense operations  03
Dynamic access control: Preserving safety and trust for netw...
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Naldurg, Prasad Campbell, Roy H. Department of Computer Science Univ. of Illinois Urbana Champaign Urbana IL 61801 United States
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capability lists in this regard, and develo... 详细信息
来源: 评论
Partial outsourcing: A new paradigm for access control  03
Partial outsourcing: A new paradigm for access control
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Abendroth, Joerg Jensen, Christian D. Distributed Systems Group Trinity College Dublin Poland Informatics and Math. Modelling Technical University of Denmark Denmark
Various security models have been proposed in recent years for different purposes. Each of these aims to ease administration by introducing new types of security policies and models. This increases the complexity a sy... 详细信息
来源: 评论
Specifying and enforcing constraints in role-based access control
Specifying and enforcing constraints in role-based access co...
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Crampton, Jason Information Security Group Royal Holloway University of London Egham TW20 0EX United Kingdom
Constraints in access control in general and separation of duty constraints in particular are an important area of research. There are two important issues relating to constraints: their specification and their enforc... 详细信息
来源: 评论
A stratification-based approach for handling conflicts in access control
A stratification-based approach for handling conflicts in ac...
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Benferhat, Salem El Baida, Rania Cuppens, Frédéric CRIL Universite d'Artois Rue Jean Souvraz SP 18 62307 Lens Cedex France IRIT Universite Paul Sabatier 118 Route de Narbonne 31062 Toulouse Cedex 4 France
In the health care sector, access to medical information is more and more electronically achieved. Therefore, it is very important to define security policies which restrict access to pieces of information in order to... 详细信息
来源: 评论
An administration concept for the enterprise role-based access control model
An administration concept for the enterprise role-based acce...
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Kern, Axel Schaad, Andreas Moffett, Jonathan Beta Systems Software AG Hermann-Heinrich-Gossen-Str. 3 50858 Köln Germany Department of Computer Science University of York York YO10 5DD United Kingdom
Using an underlying role-based model for the administration of roles has proved itself to be a successful approach. This paper sets out to describe the enterprise role-based access control model (ERBAC) in the context... 详细信息
来源: 评论
An access control model for dynamic client-side content  03
An access control model for dynamic client-side content
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Hess, Adam Seamons, Kent E. Internet Security Research Lab Department of Computer Science Brigham Young University Provo UT 84602 United States
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources are usually st... 详细信息
来源: 评论
The role control center: Features and case studies  03
The role control center: Features and case studies
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Ferraiolo, David F. Ahn, Gail-Joon Chandramouli, R. Gavrila, Serban I. NIST 820 West Diamond Dr. Gaithersburg MD 20899 United States Univ. of NC at Charlotte 9801 University City Blvd. Charlotte NC 28223 United States VDG Inc. 6009 Brookside Dr. Chevy Chase MD 20815 United States
Role-based access control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Mana... 详细信息
来源: 评论