咨询与建议

限定检索结果

文献类型

  • 48 篇 会议

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 39 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 18 篇 管理学
    • 16 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 理学
    • 12 篇 数学
    • 2 篇 统计学(可授理学、...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 23 篇 security of data
  • 7 篇 access control
  • 3 篇 xml
  • 1 篇 policy languages
  • 1 篇 role-based acces...
  • 1 篇 public key crypt...
  • 1 篇 rbac
  • 1 篇 role administrat...
  • 1 篇 high level langu...
  • 1 篇 delegation
  • 1 篇 revocation
  • 1 篇 role hierarchy
  • 1 篇 healthcare infor...
  • 1 篇 redundancy
  • 1 篇 hierarchy
  • 1 篇 role engineering
  • 1 篇 digital credenti...
  • 1 篇 privilege manage...
  • 1 篇 scenarios
  • 1 篇 temporal constra...

机构

  • 2 篇 george mason uni...
  • 1 篇 nai labs network...
  • 1 篇 school of inform...
  • 1 篇 ibm res zurich
  • 1 篇 university of so...
  • 1 篇 university of yo...
  • 1 篇 cerias computer ...
  • 1 篇 department of co...
  • 1 篇 informatik iii u...
  • 1 篇 purdue universit...
  • 1 篇 eindhoven univer...
  • 1 篇 western ontario
  • 1 篇 univ. of nc at c...
  • 1 篇 info. and mathem...
  • 1 篇 nai labs network...
  • 1 篇 dibris u. of gen...
  • 1 篇 nato communicati...
  • 1 篇 department of el...
  • 1 篇 university of ca...
  • 1 篇 beta systems sof...

作者

  • 2 篇 schaad andreas
  • 2 篇 elisa bertino
  • 2 篇 ray indrakshi
  • 2 篇 sandhu ravi
  • 2 篇 park jaehong
  • 2 篇 ahn gail-joon
  • 2 篇 ravi sandhu
  • 1 篇 gustaf neumann
  • 1 篇 wilikens marc
  • 1 篇 hess adam
  • 1 篇 harrington antho...
  • 1 篇 magri eros
  • 1 篇 ao xuhui
  • 1 篇 minsky naftaly h...
  • 1 篇 parisi-presicce ...
  • 1 篇 zannone nicola
  • 1 篇 fundulaki irini
  • 1 篇 park joon s.
  • 1 篇 marx maarten
  • 1 篇 grasso matteo

语言

  • 48 篇 英文
检索条件"任意字段=Proceedings of Seventh ACM Symposium on Access Control Models and Technologies: SACMAT 2002"
48 条 记 录,以下是11-20 订阅
排序:
Towards a credential-based implementation of compound access control policies  04
Towards a credential-based implementation of compound access...
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Biskup, Joachim Wortmann, Sandra Information System and Security University of Dortmund Germany
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using the policy algebra proposed by Bonatti,... 详细信息
来源: 评论
Using trust and risk in role-based access control policies  04
Using trust and risk in role-based access control policies
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Dimmock, Nathan Belokosztolszki, András Eyers, David Bacon, Jean Moody, Ken University of Cambridge Computer Laboratory JJ Thomson Avenue Cambridge CB3 0FD United Kingdom
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their credentials and intentions, Most distri... 详细信息
来源: 评论
Using UML to visualize role-based access control constraints  04
Using UML to visualize role-based access control constraints
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Ray, Indrakshi Li, Na France, Robert Kim, Dae-Kyoo Computer Science Dept. Colorado State University Fort Collins CO 80523 United States
Organizations use Role-Based access control (RBAC) to protect information resources from unauthorized access. We propose an approach, based on the Unified Modeling Language (UML), that shows how RBAC policies can be s... 详细信息
来源: 评论
A logical specification for usage control  04
A logical specification for usage control
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Zhang, Xinwen Park, Jaehong Parisi-Presicce, Francesco Sandhu, Ravi George Mason University United States George Mason University NSD Security United States
Recently presented usage control (UCON) has been considered as the next generation access control model with distinguishing properties of decision continuity and attribute mutability. A usage control decision is deter... 详细信息
来源: 评论
X-GTRBAC admin: A decentralized administration model for enterprise wide access control
X-GTRBAC admin: A decentralized administration model for ent...
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Bhatti, Rafae Joshi, James B.D. Bertino, Elisa Ghafoor, Arif Sch. of Elec./Computer Engineering Purdue University West Lafayette IN United States School of Information Sciences University of Pittsburgh Pittsburgh PA United States Department of Computer Sciences CERIAS Purdue University West Lafayette IN United States
access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large user and resource pools, administering... 详细信息
来源: 评论
Implementing access control to people location information  04
Implementing access control to people location information
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Hengartner, Urs Steenkiste, Peter Department of Computer Science Carnegie Mellon University United States Department of Electrical Engineering Carnegie Mellon University United States
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person's current location is a sensitive piece of information, which only authorized entities should be a... 详细信息
来源: 评论
On the role of roles: From role-based to role-sensitive access control
On the role of roles: From role-based to role-sensitive acce...
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Ao, Xuhui Minsky, Naftaly H. Department of Computer Science Rutgers University Piscataway NJ 08854 United States
This paper maintains that for an access-control (AC) mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself1-be it the semantics of RBAC, or... 详细信息
来源: 评论
Specifying access control policies for XML documents with XPath  04
Specifying access control policies for XML documents with XP...
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Fundulaki, Irini Marx, Maarten Network Data Department Bell Labs. Research United States Lang. and Inference Technology Group University of Amsterdam Netherlands
access control for XML documents is a non-trivial topic, as can be witnessed from the number of approaches presented in the literature. Trying to compare these, we discovered the need for a simple, clear and unambiguo... 详细信息
来源: 评论
Security analysis in role-based access control  04
Security analysis in role-based access control
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Li, Ninghui Tripunitara, Mahesh V. Ctr. Educ./Res. Info. Assur./Secty. Department of Computer Sciences Purdue University 656 Oval Drive West Lafayette IN 47907 United States
Delegation is often used in administrative models for Role-Based access control (RBAC) systems to decentralize administration tasks. While the use of delegation greatly enhances flexibility and scalability, it may red... 详细信息
来源: 评论
Succinct specifications of portable document access policies  04
Succinct specifications of portable document access policies
收藏 引用
proceedings on the Ninth acm symposium on access control models and technologies, sacmat 2004
作者: Bykova, Marina Atallah, Mikhail CERIAS Computer Sciences Department Purdue University United States
When customers need to each be given portable access rights to a subset of documents from a large universe of n available documents, it is often the case that the space available for representing each customer's a... 详细信息
来源: 评论