咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是451-460 订阅
排序:
Which operating system access control technique will provide the greatest overall benefit to users?  01
Which operating system access control technique will provide...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies
作者: Stephen Smalley NAI Labs
来源: 评论
Panel: which access control technique will provide the greatest overall benefit  01
Panel: which access control technique will provide the great...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies
作者: Timothy Fraser David Ferraiolo Mikel L. Matthews Casey Schaufler Stephen Smalley Robert Watson NAI Labs. National Institute of Standards and Technology Argus Systems Group Inc. SGI NAI Labs and the FreeBSD Project
The question before the panel: Considering all factors (for example: quality of protection, performance, compatibility, ease of use), which operating system access control technique will provide the greatest overall b...
来源: 评论
Panel: The next generation of acess control models (panel session): do we need them and what should they be?  01
Panel: The next generation of acess control models (panel se...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies
作者: Ravi Sandhu Elisa Bertino Jaeger Jaeger Richard Kuhn Carl Landwehr Moderator Panelist
Research on access control models was started in the 1960s and 1970s by the two thrusts of mandatory and discretionary access control. Mandatory access control (MAC) came from the military and national security arenas...
来源: 评论
A graphical definition of authorization schema in the DTAC model  01
A graphical definition of authorization schema in the DTAC m...
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies
作者: Jonathon E. Tidswell John M. Potter Univ. of New South Wales Sydney Australia
The specification of constraint languages for access control models has proven to be difficult but remains necessary for safety and for mandatory access control policies. While the authorisation relation $(Subject \ti... 详细信息
来源: 评论
Managing access control complexity using metrices  01
Managing access control complexity using metrices
收藏 引用
proceedings of the sixth acm symposium on access control models and technologies
作者: Trent Jeager IBM T.J. Watson Research Center Hawthorne NY
General access control models enable flexible expression of access control policies, but they make the verification of whether a particular access control configuration is safe (i.e., prevents the leakage of a permiss...
来源: 评论
Link quality in SIR based power control for UMTS CDMA systems
Link quality in SIR based power control for UMTS CDMA system...
收藏 引用
11th IEEE International symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2000)
作者: Oppermann, I Latva-aho, M Kumpumaki, T Univ Oulu Dept Elect Engn CWC Oulu FIN-90571 Oulu Finland
This paper examines the related issues of capacity, coverage and power control in a multi-cell WCDMA network. The network capacity in this case is based on required link quality thresholds. If all users achieve the re... 详细信息
来源: 评论
SIMULATION MODEL FOR ANALYZING THE PERFORMANCE BEHAVIOR OF TOKEN-RING LOCAL AREA NETWORKS.
SIMULATION MODEL FOR ANALYZING THE PERFORMANCE BEHAVIOR OF T...
收藏 引用
Record of proceedings - The 20th Annual Simulation symposium.
作者: Dudzik, W.F. Advanced System Technologies USA Advanced System Technologies USA
A description is given of the design and capabilities of a simulation program that models the behavior of a token-ring access local area network (LAN). Such networks consist of a variety of devices connected to a high... 详细信息
来源: 评论
A simulation model for analyzing the performance behavior of token-ring local area networks  20
A simulation model for analyzing the performance behavior of...
收藏 引用
20th Annual symposium on Simulation, ANSS 1987
作者: Dudzik, W.F. Advanced System Technologies United States
This paper describes the design and capabilities of a simulation program that models the behavior of a token-ring access local area network (LAN). Such networks consist of a variety of devices connected to a high spee... 详细信息
来源: 评论