咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是411-420 订阅
排序:
Role-based access control for collaborative enterprise in Peer-to-Peer computing environments  03
Role-based access control for collaborative enterprise in Pe...
收藏 引用
proceedings of eighth acm symposium on access control models and technologies
作者: Park, Joon S. Hwang, Junseok School of Information Studies Syracuse University Syracuse NY 13244-4100 United States
In Peer-to-Peer (P2P) computing environments, each participant (peer) acts as both client and content provider. This satisfies the requirement that resources should be increasingly made available by being published to... 详细信息
来源: 评论
The PERMIS X.509 role based privilege management infrastructure  02
The PERMIS X.509 role based privilege management infrastruct...
收藏 引用
TERENA Networking Conference 2002
作者: Chadwick, DW Otenko, A Univ Salford IS Inst Manchester M5 4WT Lancs England
This paper describes the EC PERMIS project, which has developed a role based access control infrastructure that uses X.509 attribute certificates (ACs) to store the users' roles. All access control decisions are d... 详细信息
来源: 评论
Role mining - revealing business roles for security administration using data mining technology  03
Role mining - revealing business roles for security administ...
收藏 引用
proceedings of the eighth acm symposium on access control models and technologies
作者: Martin Kuhlmann Dalia Shohat Gerhard Schimpf SYSTOR Security Solutions GmbH Hermann-Heinrich-Gossen-Strasse 3 Cologne SMF TEAM IT-Security Consulting Am Waldweg 23 Pforzheim
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to... 详细信息
来源: 评论
Specifying and enforcing constraints in role-based access control  03
Specifying and enforcing constraints in role-based access co...
收藏 引用
proceedings of the eighth acm symposium on access control models and technologies
作者: Jason Crampton University of London Egham United Kingdom
Constraints in access control in general and separation of duty constraints in particular are an important area of research. There are two important issues relating to constraints: their specification and their enforc... 详细信息
来源: 评论
Induced role hierarchies with attribute-based RBAC  03
Induced role hierarchies with attribute-based RBAC
收藏 引用
proceedings of the eighth acm symposium on access control models and technologies
作者: Mohammad A. Al-Kahtani Ravi Sandhu George Mason University
The Role-Based access control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, assigning users to roles ought to be a... 详细信息
来源: 评论
A stratification-based approach for handling conflicts in access control  03
A stratification-based approach for handling conflicts in ac...
收藏 引用
proceedings of the eighth acm symposium on access control models and technologies
作者: Salem Benferhat Rania El Baida Frédéric Cuppens CRIL-Université d'Artois Lens Cedex France IRIT-Université Paul Sabatier Toulouse Cedex 4 France
In the health care sector, access to medical information is more and more electronically achieved. Therefore, it is very important to define security policies which restrict access to pieces of information in order to... 详细信息
来源: 评论
An administration concept for the enterprise role-based access control model  03
An administration concept for the enterprise role-based acce...
收藏 引用
proceedings of the eighth acm symposium on access control models and technologies
作者: Axel Kern Andreas Schaad Jonathan Moffett Beta Systems Software AG Köln Germany University of York York UK
Using an underlying role-based model for the administration of roles has proved itself to be a successful approach. This paper sets out to describe the enterprise role-based access control model (ERBAC) in the context... 详细信息
来源: 评论
On modeling system-centric information for role engineering  03
On modeling system-centric information for role engineering
收藏 引用
proceedings of the eighth acm symposium on access control models and technologies
作者: Dongwan Shin Gail-Joon Ahn Sangrae Cho Seunghun Jin University of North Carolina at Charlotte Charlotte NC Electronics and Telecommunications Research Institute Taejon South Korea
In this paper we present an approach to modeling system-centric information in order to facilitate role engineering (RE). In particular, we first discuss the general characteristics of the information required in RE. ... 详细信息
来源: 评论
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
Proceedings of Seventh ACM Symposium on Access Control Model...
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
The proceedings contains 17 papers. Topics discussed include access control policies and specifications, role engineering, access control management and models, mobile and cooperative systems and making access control... 详细信息
来源: 评论
A lightweight approach to specification and analysis of role-based access control extensions  02
A lightweight approach to specification and analysis of role...
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
作者: Schaad, Andreas Moffett, Jonathan D. Department of Computer Science University of York York United Kingdom
Role-based access control is a powerful and policy-neutral concept for enforcing access control. Many extensions have been proposed, the most significant of which are the decentralised administration of role-based sys... 详细信息
来源: 评论