咨询与建议

限定检索结果

文献类型

  • 48 篇 会议

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 39 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 18 篇 管理学
    • 16 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 理学
    • 12 篇 数学
    • 2 篇 统计学(可授理学、...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 23 篇 security of data
  • 7 篇 access control
  • 3 篇 xml
  • 1 篇 policy languages
  • 1 篇 role-based acces...
  • 1 篇 public key crypt...
  • 1 篇 rbac
  • 1 篇 role administrat...
  • 1 篇 high level langu...
  • 1 篇 delegation
  • 1 篇 revocation
  • 1 篇 role hierarchy
  • 1 篇 healthcare infor...
  • 1 篇 redundancy
  • 1 篇 hierarchy
  • 1 篇 role engineering
  • 1 篇 digital credenti...
  • 1 篇 privilege manage...
  • 1 篇 scenarios
  • 1 篇 temporal constra...

机构

  • 2 篇 george mason uni...
  • 1 篇 nai labs network...
  • 1 篇 school of inform...
  • 1 篇 ibm res zurich
  • 1 篇 university of so...
  • 1 篇 university of yo...
  • 1 篇 cerias computer ...
  • 1 篇 department of co...
  • 1 篇 informatik iii u...
  • 1 篇 purdue universit...
  • 1 篇 eindhoven univer...
  • 1 篇 western ontario
  • 1 篇 univ. of nc at c...
  • 1 篇 info. and mathem...
  • 1 篇 nai labs network...
  • 1 篇 dibris u. of gen...
  • 1 篇 nato communicati...
  • 1 篇 department of el...
  • 1 篇 university of ca...
  • 1 篇 beta systems sof...

作者

  • 2 篇 schaad andreas
  • 2 篇 elisa bertino
  • 2 篇 ray indrakshi
  • 2 篇 sandhu ravi
  • 2 篇 park jaehong
  • 2 篇 ahn gail-joon
  • 2 篇 ravi sandhu
  • 1 篇 gustaf neumann
  • 1 篇 wilikens marc
  • 1 篇 hess adam
  • 1 篇 harrington antho...
  • 1 篇 magri eros
  • 1 篇 ao xuhui
  • 1 篇 minsky naftaly h...
  • 1 篇 parisi-presicce ...
  • 1 篇 zannone nicola
  • 1 篇 fundulaki irini
  • 1 篇 park joon s.
  • 1 篇 marx maarten
  • 1 篇 grasso matteo

语言

  • 48 篇 英文
检索条件"任意字段=Proceedings of Seventh ACM Symposium on Access Control Models and Technologies: SACMAT 2002"
48 条 记 录,以下是31-40 订阅
排序:
Role-based access control for collaborative enterprise in Peer-to-Peer computing environments  03
Role-based access control for collaborative enterprise in Pe...
收藏 引用
proceedings of Eighth acm symposium on access control models and technologies
作者: Park, Joon S. Hwang, Junseok School of Information Studies Syracuse University Syracuse NY 13244-4100 United States
In Peer-to-Peer (P2P) computing environments, each participant (peer) acts as both client and content provider. This satisfies the requirement that resources should be increasingly made available by being published to... 详细信息
来源: 评论
The PERMIS X.509 role based privilege management infrastructure  02
The PERMIS X.509 role based privilege management infrastruct...
收藏 引用
TERENA Networking Conference 2002
作者: Chadwick, DW Otenko, A Univ Salford IS Inst Manchester M5 4WT Lancs England
This paper describes the EC PERMIS project, which has developed a role based access control infrastructure that uses X.509 attribute certificates (ACs) to store the users' roles. All access control decisions are d... 详细信息
来源: 评论
A lightweight approach to specification and analysis of role-based access control extensions  02
A lightweight approach to specification and analysis of role...
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
作者: Schaad, Andreas Moffett, Jonathan D. Department of Computer Science University of York York United Kingdom
Role-based access control is a powerful and policy-neutral concept for enforcing access control. Many extensions have been proposed, the most significant of which are the decentralised administration of role-based sys... 详细信息
来源: 评论
models for coalition-based access control (CBAC)  02
Models for coalition-based access control (CBAC)
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
作者: Cohen, Eve Thomas, Roshan K. Winsborough, William Shands, Deborah NAI Labs Network Associates Inc. 3415 S. Sepulveda Bld Suite 700 Los Angeles CA 90034 United States NAI Labs Network Associates Inc. 1145 Herndon Parkway Suite 500 Herndon VA 20170 United States NAI Labs Network Associates Inc. 3060 Washington Road Glenwood MD 21738 United States
To effectively participate in modern coalitions, member organizations must be able to share specific data and functionality with coalition partners, while ensuring that their resources are safe from inappropriate acce... 详细信息
来源: 评论
Managing access control policies using access control spaces  02
Managing access control policies using access control spaces
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
作者: Jaeger, Trent Edwards, Antony Zhang, Xiaolan IBM T.J. Watson Research Center Hawthorne NY 10532 United States
We present the concept of an access control space and investigate how it may be useful in managing access control policies. An access control space represents the permission assignment state of a subject. We identify ... 详细信息
来源: 评论
A context-related authorization and access control method based on RBAC: A case study from the health care domain  02
A context-related authorization and access control method ba...
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
作者: Wilikens, Marc Feriti, Simone Sanna, Alberto Masera, Marcelo Italy Sci. Inst. Hospital San Raffaele Via Olgettina 60 20132 Milan Italy
This paper describes an application of authorization and access control based on the Role Based access control (RBAC) method and integrated in a comprehensive trust infrastructure of a health care application. The met... 详细信息
来源: 评论
A cryptographic solution to implement access control in a hierarchy and more
A cryptographic solution to implement access control in a hi...
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
作者: Ray, Indrakshi Ray, Indrajit Narasimhamurthi, Natu CS Department Colorado State University Fort Collins CO 80523 United States ECE Department Univ. of Michigan Dearborn Dearborn MI 48128 United States
The need for access control in a hierarchy arises in several different contexts. One such context is managing the information of an organization where the users are divided into different security classes depending on... 详细信息
来源: 评论
An access control language for web services  02
An access control language for web services
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
作者: Sirer, Emin Gün Wang, Ke Computer Science Department Cornell University Ithaca NY 14853 United States
This paper presents an approach for formally specifying and enforcing security policies on web service implementations. Networked services in general, and web services in particular, require extensive amounts of code ... 详细信息
来源: 评论
Towards usage control models: Beyond traditional access control
Towards usage control models: Beyond traditional access cont...
收藏 引用
proceedings of seventh acm symposium on access control models and technologies: sacmat 2002
作者: Park, Jaehong Sandhu, Ravi Lab. for Info. Security Technol. George Mason University 4400 University Dr. Fairfax VA 22030 United States *** Inc. George Mason University 11417 Sunset Hills Road Reston VA 20190 United States
In this paper we develop the concept of Usage control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage c... 详细信息
来源: 评论
Session details: access control Management and models  02
Session details: Access Control Management and Models
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Michael Bret Naval Postgraduate School
No abstract available.
来源: 评论