咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是421-430 订阅
排序:
models for coalition-based access control (CBAC)  02
Models for coalition-based access control (CBAC)
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
作者: Cohen, Eve Thomas, Roshan K. Winsborough, William Shands, Deborah NAI Labs Network Associates Inc. 3415 S. Sepulveda Bld Suite 700 Los Angeles CA 90034 United States NAI Labs Network Associates Inc. 1145 Herndon Parkway Suite 500 Herndon VA 20170 United States NAI Labs Network Associates Inc. 3060 Washington Road Glenwood MD 21738 United States
To effectively participate in modern coalitions, member organizations must be able to share specific data and functionality with coalition partners, while ensuring that their resources are safe from inappropriate acce... 详细信息
来源: 评论
A context-related authorization and access control method based on RBAC: A case study from the health care domain  02
A context-related authorization and access control method ba...
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
作者: Wilikens, Marc Feriti, Simone Sanna, Alberto Masera, Marcelo Italy Sci. Inst. Hospital San Raffaele Via Olgettina 60 20132 Milan Italy
This paper describes an application of authorization and access control based on the Role Based access control (RBAC) method and integrated in a comprehensive trust infrastructure of a health care application. The met... 详细信息
来源: 评论
Managing access control policies using access control spaces  02
Managing access control policies using access control spaces
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
作者: Jaeger, Trent Edwards, Antony Zhang, Xiaolan IBM T.J. Watson Research Center Hawthorne NY 10532 United States
We present the concept of an access control space and investigate how it may be useful in managing access control policies. An access control space represents the permission assignment state of a subject. We identify ... 详细信息
来源: 评论
A cryptographic solution to implement access control in a hierarchy and more
A cryptographic solution to implement access control in a hi...
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
作者: Ray, Indrakshi Ray, Indrajit Narasimhamurthi, Natu CS Department Colorado State University Fort Collins CO 80523 United States ECE Department Univ. of Michigan Dearborn Dearborn MI 48128 United States
The need for access control in a hierarchy arises in several different contexts. One such context is managing the information of an organization where the users are divided into different security classes depending on... 详细信息
来源: 评论
An access control language for web services  02
An access control language for web services
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
作者: Sirer, Emin Gün Wang, Ke Computer Science Department Cornell University Ithaca NY 14853 United States
This paper presents an approach for formally specifying and enforcing security policies on web service implementations. Networked services in general, and web services in particular, require extensive amounts of code ... 详细信息
来源: 评论
Towards usage control models: Beyond traditional access control
Towards usage control models: Beyond traditional access cont...
收藏 引用
proceedings of Seventh acm symposium on access control models and technologies: SacmAT 2002
作者: Park, Jaehong Sandhu, Ravi Lab. for Info. Security Technol. George Mason University 4400 University Dr. Fairfax VA 22030 United States *** Inc. George Mason University 11417 Sunset Hills Road Reston VA 20190 United States
In this paper we develop the concept of Usage control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage c... 详细信息
来源: 评论
Session details: access control Management and models  02
Session details: Access Control Management and Models
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Michael Bret Naval Postgraduate School
No abstract available.
来源: 评论
Session details: access control Policies and Specifications  02
Session details: Access Control Policies and Specifications
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Morris Sloman Imperial College
No abstract available.
来源: 评论
A scenario-driven role engineering process for functional RBAC roles  02
A scenario-driven role engineering process for functional RB...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Gustaf Neumann Mark Strembeck Vienna University of Economics and BA Austria
In this paper we present a novel scenario-driven role engineering process for RBAC roles. The scenario concept is of central significance for the presented approach. Due to the strong human factor in role engineering ... 详细信息
来源: 评论
Making access control more usable  02
Making access control more usable
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Elisa Bertino Trent Jaeger Jonathan Moffett Slyvia Osborn Ravi Ravi University of Milano IBM Research University of York Western Ontario George Mason
Scope: a variety of things are expressed under the heading of access control: permission assignments, constraints, activations, transition, hierarchies, ect. What things really need to be expressed?Concepts: What mode...
来源: 评论