咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是431-440 订阅
排序:
A role-based delegation framework for healthcare information systems  02
A role-based delegation framework for healthcare information...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Longhua Zhang Gail-Joon Ahn Bei-Tseng Chu UNC Charlotte Charlotte NC
As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. The proposed delegation ... 详细信息
来源: 评论
Temporal hierarchies and inheritance semantics for GTRBAC  02
Temporal hierarchies and inheritance semantics for GTRBAC
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: James B D Joshi Elisa Bertino Arif Ghafoor Purdue University West Lafayette IN Universita' di Milano Milano Italy
A Generalized Temporal Role Based access control (GTRBAC) model that allows specification of a comprehensive set of temporal constraint for access control has recently been proposed. The model constructs allow one to ... 详细信息
来源: 评论
A model for role administration using organization structure  02
A model for role administration using organization structure
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Sejong Oh Ravi Sandhu George Mason University Fairfax VA
Role-based access control (RBAC) is recognized as an excellent model for access control in an enterprise environment. In large enterprises, effective RBAC administration is a major issue. ARBAC97 is a well-known solut... 详细信息
来源: 评论
A cryptographic solution to implement access control in a hierarchy and more  02
A cryptographic solution to implement access control in a hi...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Indrakshi Ray Indrajit Ray Natu Narasimhamurthi Colorado State University Fort Collins CO Univ. of Michigan Dearborn Dearborn MI
The need for access control in a hierarchy arises in severaldifferent contexts. One such context is managing the information ofan organization where the users are divided into different securityclasses depending on wh... 详细信息
来源: 评论
Towards usage control models: beyond traditional access control  02
Towards usage control models: beyond traditional access cont...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Jaehong Park Ravi Sandhu George Mason University Fairfax VA George Mason University Reston VA
In this paper we develop the concept of Usage control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage c...
来源: 评论
proceedings of Sixth acm symposium on access control models and technologies (SacmAT 2001): Foreword
Proceedings of Sixth ACM Symposium on Access Control Models ...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Sandhu, Ravi Jaeger, Trent
来源: 评论
proceedings of the sixth acm symposium on access control models and technologies: SacmAT 2001
Proceedings of the sixth ACM symposium on access control mod...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
The proceedings contains 16 papers from proceedings of the Sixth acm symposium on access control models and technologies: SacmAT 2001. The topics discussed include: the role-based access control system of a European B... 详细信息
来源: 评论
The next generation of access control models: Do we need them and what should they be?
The next generation of access control models: Do we need the...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Sandhu, Ravi Bertino, Elisa Jaeger, Trent Kuhn, Richard Landwehr, Carl George Mason University Fairfax VA United States
来源: 评论
Which access control technique will provide the greatest overall benefit?
Which access control technique will provide the greatest ove...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Fraser, Timothy Ferraiolo, David F. Matthews, Mikel L. Schaufler, Casey Smalley, Stephen Watson, Robert
来源: 评论
On the specification and evolution of access control policies  01
On the specification and evolution of access control policie...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Koch, M. Mancini, L.V. Parisi-Presicce, F. P.S.I. AG Berlin Germany Univ. di Roma La Sapienza Rome Italy George Mason Univ. Fairfax VA United States Dipto. di Scienze dell'Informazione Univ. di Roma La Sapienza Rome Italy
A uniform and precise framework for the specification of access control policies is proposed. The uniform framework allows the detailed comparison of different policy models, the precise description of the evolution o... 详细信息
来源: 评论