咨询与建议

限定检索结果

文献类型

  • 48 篇 会议

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 39 篇 计算机科学与技术...
    • 38 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 18 篇 管理学
    • 16 篇 图书情报与档案管...
    • 9 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 理学
    • 12 篇 数学
    • 2 篇 统计学(可授理学、...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 23 篇 security of data
  • 7 篇 access control
  • 3 篇 xml
  • 1 篇 policy languages
  • 1 篇 role-based acces...
  • 1 篇 public key crypt...
  • 1 篇 rbac
  • 1 篇 role administrat...
  • 1 篇 high level langu...
  • 1 篇 delegation
  • 1 篇 revocation
  • 1 篇 role hierarchy
  • 1 篇 healthcare infor...
  • 1 篇 redundancy
  • 1 篇 hierarchy
  • 1 篇 role engineering
  • 1 篇 digital credenti...
  • 1 篇 privilege manage...
  • 1 篇 scenarios
  • 1 篇 temporal constra...

机构

  • 2 篇 george mason uni...
  • 1 篇 nai labs network...
  • 1 篇 school of inform...
  • 1 篇 ibm res zurich
  • 1 篇 university of so...
  • 1 篇 university of yo...
  • 1 篇 cerias computer ...
  • 1 篇 department of co...
  • 1 篇 informatik iii u...
  • 1 篇 purdue universit...
  • 1 篇 eindhoven univer...
  • 1 篇 western ontario
  • 1 篇 univ. of nc at c...
  • 1 篇 info. and mathem...
  • 1 篇 nai labs network...
  • 1 篇 dibris u. of gen...
  • 1 篇 nato communicati...
  • 1 篇 department of el...
  • 1 篇 university of ca...
  • 1 篇 beta systems sof...

作者

  • 2 篇 schaad andreas
  • 2 篇 elisa bertino
  • 2 篇 ray indrakshi
  • 2 篇 sandhu ravi
  • 2 篇 park jaehong
  • 2 篇 ahn gail-joon
  • 2 篇 ravi sandhu
  • 1 篇 gustaf neumann
  • 1 篇 wilikens marc
  • 1 篇 hess adam
  • 1 篇 harrington antho...
  • 1 篇 magri eros
  • 1 篇 ao xuhui
  • 1 篇 minsky naftaly h...
  • 1 篇 parisi-presicce ...
  • 1 篇 zannone nicola
  • 1 篇 fundulaki irini
  • 1 篇 park joon s.
  • 1 篇 marx maarten
  • 1 篇 grasso matteo

语言

  • 48 篇 英文
检索条件"任意字段=Proceedings of Seventh ACM Symposium on Access Control Models and Technologies: SACMAT 2002"
48 条 记 录,以下是41-50 订阅
排序:
Session details: access control Policies and Specifications  02
Session details: Access Control Policies and Specifications
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Morris Sloman Imperial College
No abstract available.
来源: 评论
A scenario-driven role engineering process for functional RBAC roles  02
A scenario-driven role engineering process for functional RB...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Gustaf Neumann Mark Strembeck Vienna University of Economics and BA Austria
In this paper we present a novel scenario-driven role engineering process for RBAC roles. The scenario concept is of central significance for the presented approach. Due to the strong human factor in role engineering ... 详细信息
来源: 评论
Making access control more usable  02
Making access control more usable
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Elisa Bertino Trent Jaeger Jonathan Moffett Slyvia Osborn Ravi Ravi University of Milano IBM Research University of York Western Ontario George Mason
Scope: a variety of things are expressed under the heading of access control: permission assignments, constraints, activations, transition, hierarchies, ect. What things really need to be expressed?Concepts: What mode...
来源: 评论
A role-based delegation framework for healthcare information systems  02
A role-based delegation framework for healthcare information...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Longhua Zhang Gail-Joon Ahn Bei-Tseng Chu UNC Charlotte Charlotte NC
As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. The proposed delegation ... 详细信息
来源: 评论
Temporal hierarchies and inheritance semantics for GTRBAC  02
Temporal hierarchies and inheritance semantics for GTRBAC
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: James B D Joshi Elisa Bertino Arif Ghafoor Purdue University West Lafayette IN Universita' di Milano Milano Italy
A Generalized Temporal Role Based access control (GTRBAC) model that allows specification of a comprehensive set of temporal constraint for access control has recently been proposed. The model constructs allow one to ... 详细信息
来源: 评论
A model for role administration using organization structure  02
A model for role administration using organization structure
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Sejong Oh Ravi Sandhu George Mason University Fairfax VA
Role-based access control (RBAC) is recognized as an excellent model for access control in an enterprise environment. In large enterprises, effective RBAC administration is a major issue. ARBAC97 is a well-known solut... 详细信息
来源: 评论
A cryptographic solution to implement access control in a hierarchy and more  02
A cryptographic solution to implement access control in a hi...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Indrakshi Ray Indrajit Ray Natu Narasimhamurthi Colorado State University Fort Collins CO Univ. of Michigan Dearborn Dearborn MI
The need for access control in a hierarchy arises in severaldifferent contexts. One such context is managing the information ofan organization where the users are divided into different securityclasses depending on wh... 详细信息
来源: 评论
Towards usage control models: beyond traditional access control  02
Towards usage control models: beyond traditional access cont...
收藏 引用
proceedings of the seventh acm symposium on access control models and technologies
作者: Jaehong Park Ravi Sandhu George Mason University Fairfax VA George Mason University Reston VA
In this paper we develop the concept of Usage control (UCON) that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope. While usage c...
来源: 评论