咨询与建议

限定检索结果

文献类型

  • 48 篇 会议

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 39 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 18 篇 管理学
    • 16 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 理学
    • 12 篇 数学
    • 2 篇 统计学(可授理学、...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 23 篇 security of data
  • 7 篇 access control
  • 3 篇 xml
  • 1 篇 policy languages
  • 1 篇 role-based acces...
  • 1 篇 public key crypt...
  • 1 篇 rbac
  • 1 篇 role administrat...
  • 1 篇 high level langu...
  • 1 篇 delegation
  • 1 篇 revocation
  • 1 篇 role hierarchy
  • 1 篇 healthcare infor...
  • 1 篇 redundancy
  • 1 篇 hierarchy
  • 1 篇 role engineering
  • 1 篇 digital credenti...
  • 1 篇 privilege manage...
  • 1 篇 scenarios
  • 1 篇 temporal constra...

机构

  • 2 篇 george mason uni...
  • 1 篇 nai labs network...
  • 1 篇 school of inform...
  • 1 篇 ibm res zurich
  • 1 篇 university of so...
  • 1 篇 university of yo...
  • 1 篇 cerias computer ...
  • 1 篇 department of co...
  • 1 篇 informatik iii u...
  • 1 篇 purdue universit...
  • 1 篇 eindhoven univer...
  • 1 篇 western ontario
  • 1 篇 univ. of nc at c...
  • 1 篇 info. and mathem...
  • 1 篇 nai labs network...
  • 1 篇 dibris u. of gen...
  • 1 篇 nato communicati...
  • 1 篇 department of el...
  • 1 篇 university of ca...
  • 1 篇 beta systems sof...

作者

  • 2 篇 schaad andreas
  • 2 篇 elisa bertino
  • 2 篇 ray indrakshi
  • 2 篇 sandhu ravi
  • 2 篇 park jaehong
  • 2 篇 ahn gail-joon
  • 2 篇 ravi sandhu
  • 1 篇 gustaf neumann
  • 1 篇 wilikens marc
  • 1 篇 hess adam
  • 1 篇 harrington antho...
  • 1 篇 magri eros
  • 1 篇 ao xuhui
  • 1 篇 minsky naftaly h...
  • 1 篇 parisi-presicce ...
  • 1 篇 zannone nicola
  • 1 篇 fundulaki irini
  • 1 篇 park joon s.
  • 1 篇 marx maarten
  • 1 篇 grasso matteo

语言

  • 48 篇 英文
检索条件"任意字段=Proceedings of Seventh ACM Symposium on Access Control Models and Technologies: SACMAT 2002"
48 条 记 录,以下是1-10 订阅
排序:
Preventing information inference in access control  15
Preventing information inference in access control
收藏 引用
20th acm symposium on access control models and technologies, sacmat 2015
作者: Paci, Federica Zannone, Nicola University of Southampton United Kingdom Eindhoven University of Technology Netherlands
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy conce... 详细信息
来源: 评论
Content-based information protection and release in NATO operations  13
Content-based information protection and release in NATO ope...
收藏 引用
18th acm symposium on access control models and technologies, sacmat 2013
作者: Armando, Alessandro Grasso, Matteo Oudkerk, Sander Ranise, Silvio Wrona, Konrad DIBRIS U. of Genova Italy Security and Trust Unit FBK-Irst Trento Italy Agent Sierra Consultancy Services Amsterdam Netherlands NATO Communications and Information Agency The Hague Netherlands
The successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted u... 详细信息
来源: 评论
On the notion of redundancy in access control policies  13
On the notion of redundancy in access control policies
收藏 引用
18th acm symposium on access control models and technologies, sacmat 2013
作者: Guarnieri, Marco Neri, Mario Arrigoni Magri, Eros Mutti, Simone Institute of Information Security ETH Zürich Switzerland Università degli Studi Bergamo Italy Comelit R and D Comelit Group S.p.A Italy
The evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may incr... 详细信息
来源: 评论
SecureBPMN: Modeling and enforcing access control requirements in business processes  12
SecureBPMN: Modeling and enforcing access control requiremen...
收藏 引用
17th acm symposium on access control models and technologies, sacmat'12
作者: Brucker, Achim D. Hang, Isabelle Lückemeyer, Gero Ruparel, Raj SAP Research Vincenz-Priessnitz-Str. 1 76131 Karlsruhe Germany Hochschule für Technik Stuttgart Schellingstr. 24 70174 Stuttgart Germany
Modern enterprise systems have to comply to regulations such as Basel III resulting in complex security requirements. These requirements need to be modeled at design-time and enforced at runtime. Moreover, modern ente... 详细信息
来源: 评论
A Card Requirements Language Enabling Privacy-Preserving access control
A Card Requirements Language Enabling Privacy-Preserving Acc...
收藏 引用
15th acm symposium on access control models and technologies
作者: Camenisch, Jan Moedersheim, Sebastian Neven, Gregory Preiss, Franz-Stefan Sommer, Dieter IBM Res Zurich Zurich Switzerland
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online resources, even though existing techn... 详细信息
来源: 评论
An access control Model for Mobile Physical Objects
An Access Control Model for Mobile Physical Objects
收藏 引用
15th acm symposium on access control models and technologies
作者: Kerschbaum, Florian SAP Res Karlsruhe Germany
access to distributed databases containing tuples collected about mobile physical objects requires information about the objects' trajectories. Existing access control models cannot encode this information efficie... 详细信息
来源: 评论
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
Proceedings of Seventh ACM Symposium on Access Control Model...
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
The proceedings contains 17 papers. Topics discussed include access control policies and specifications, role engineering, access control management and models, mobile and cooperative systems and making access control... 详细信息
来源: 评论
proceedings of ninth acm symposium on access control models and technologies sacmat 2004
Proceedings of ninth ACM symposium on access control models ...
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
The proceedings contains 18 papers from Ninth acm symposium on access control models and technologies, sacmat 2004. The topics discussed include: a logical specification for usage control;implementing access control t... 详细信息
来源: 评论
A role-based approach to access control for XML databases  04
A role-based approach to access control for XML databases
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Wang, Jingzhu Osborn, Sylvia L. Department of Computer Science University of Western Ontario London Ont. N6A-5B7 Canada
In order to provide a general access control methodology for parts of XML documents, we propose combining role-based access control as found in the Role Graph Model, with a methodology originally designed for object-o... 详细信息
来源: 评论
Role-based access control in ambient and remote space  04
Role-based access control in ambient and remote space
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Wedde, Horst F. Lischka, Mario Informatik III University of Dortmund 44221 Dortmund Germany
In the era of Ubiquitous Computing and world-wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and distributed access to information, services,... 详细信息
来源: 评论