咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是441-450 订阅
排序:
A logical framework for reasoning about access control models  01
A logical framework for reasoning about access control model...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Bertino, Elisa Catania, Barbara Ferrari, Elena Perlasca, Paolo Dipto. di Scienze dell'Informazione University of Milano Via Comelico 39/41 20135 Milano Italy
The increased availability of tools and technologies to access and use the data has made more urgent the needs for data protection. Moreover, emerging applications and data models call for more flexible and expressive... 详细信息
来源: 评论
The role-based access control system of a European Bank: A case study and discussion  01
The role-based access control system of a European Bank: A c...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Schaad, Andreas Moffett, Jonathan Jacob, Jeremy Department of Computer Science University of York York YO10 5DD United Kingdom
Research in the area of role-based access control has made fast progress over the last few years. However, little has been done to identify and describe existing role-based access control systems within large organisa... 详细信息
来源: 评论
Managing access control complexity using metrics
Managing access control complexity using metrics
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Jaeger, Trent IBM T. J. Watson Research Center 30 Saw Mill River Road Hawthorne NY 10532 United States
General access control models enable flexible expression of access control policies, but they make the verification of whether a particular access control configuration is safe (i.e., prevents the leakage of a permiss... 详细信息
来源: 评论
The YGuard access control Model: Set-based access control  01
The YGuard Access Control Model: Set-based access control
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Van den Akker, Ty Snell, Quinn O. Clement, Mark J. Department of Computer Science Brigham Young University Provo UT 84602-6576 United States
As Internet usage proliferates, resource security becomes both more important and more complex. Contemporary users and systems are ill-equipped to deal with the complex security demands of a ubiquitous, insecure netwo... 详细信息
来源: 评论
Improving the granularity of access control in Windows NT  01
Improving the granularity of access control in Windows NT
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Swift, Michael M. Brundrett, Peter Van Dyke, Cliff Garg, Praerit Hopkins, Anne Chan, Shannon Goertzel, Mario Jensenworth, Gregory Microsoft Corporation 1 Microsoft Way Redmond WA 98052 United States University of Washington Seattle WA 98195 United States
This paper presents the access control mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Ac... 详细信息
来源: 评论
Flexible team-based access control using contexts  01
Flexible team-based access control using contexts
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Georgiadis, Christos K. Mavridis, Ioannis Pangalos, George Thomas, Roshan K. Informatics Lab Faculty of Technology Aristotle University of Thessaloniki Thessaloniki 54006 Greece NAI Labs Network Associates 8000 Westpark Drive McLean VA 22102-3015 United States
We discuss the integration of contextual information with team-based access control. The TMAC model was formulated by Thomas in [1] to provide access control for collaborative activity best accomplished by teams of us... 详细信息
来源: 评论
access control mechanisms for inter-organizational workflow  01
Access control mechanisms for inter-organizational workflow
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Kang, Myong H. Park, Joon S. Froscher, Judith N. Naval Research Laboratory Information Technology Division 4555 Overlook Ave. Washington DC 20375 United States
As more businesses engage in globalization, inter-organizational collaborative computing grows in importance. Since we cannot expect homogeneous computing environments in participating organizations, heterogeneity and... 详细信息
来源: 评论
A model of OASIS role-based access control and its support for active security  01
A model of OASIS role-based access control and its support f...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies (SacmAT 2001)
作者: Yao, Walt Moody, Ken Bacon, Jean University of Cambridge Computer Laboratory Pembroke Street Cambridge United Kingdom
OASES is a role-based access control architecture for achieving secure interoperation of services in an open, distributed environment. Services define roles and implement formally specified policy for role activation ... 详细信息
来源: 评论
On the performance of ad hoc networks with beamforming antennas  01
On the performance of ad hoc networks with beamforming anten...
收藏 引用
proceedings of the 2001 acm International symposium on Mobile Ad Hoc Networking and Computing: MobiHoc 2001
作者: Ramanathan, Ram Internetwork Research Department BBN Technologies Verizon Cambridge MA United States
Beamforming antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. We present a broad-based examination of this potential, focusing on exploiting the longer ranges as well as the... 详细信息
来源: 评论
An argument for the role-based access control model  01
An argument for the role-based access control model
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies
作者: David F. Ferraiolo National Institute of Standards and Technology
来源: 评论