咨询与建议

限定检索结果

文献类型

  • 19 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 18 篇 计算机科学与技术...
    • 12 篇 控制科学与工程
    • 12 篇 软件工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
  • 4 篇 管理学
    • 4 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 统计学(可授理学、...

主题

  • 8 篇 control system a...
  • 3 篇 access control
  • 2 篇 data privacy
  • 2 篇 xml
  • 1 篇 location-based s...
  • 1 篇 architecture
  • 1 篇 relationship-bas...
  • 1 篇 building constru...
  • 1 篇 data reduction
  • 1 篇 sandbox policy
  • 1 篇 context sensitiv...
  • 1 篇 conflict resolut...
  • 1 篇 linux applicatio...
  • 1 篇 gis
  • 1 篇 privacy
  • 1 篇 multi-party acce...
  • 1 篇 access-control m...

机构

  • 1 篇 beta systems sof...
  • 1 篇 univ genoa dipar...
  • 1 篇 ecole polytech f...
  • 1 篇 offis e.v. esche...
  • 1 篇 purdue univ ceri...
  • 1 篇 north carolina s...
  • 1 篇 telematica insti...
  • 1 篇 computer science...
  • 1 篇 institute of com...
  • 1 篇 dept. social inf...
  • 1 篇 computer science...
  • 1 篇 internet securit...
  • 1 篇 george mason uni...
  • 1 篇 information scie...
  • 1 篇 penn state univ ...
  • 1 篇 university of br...
  • 1 篇 computer science...
  • 1 篇 university of in...
  • 1 篇 univ milan dipar...
  • 1 篇 smeal college of...

作者

  • 2 篇 bertino elisa
  • 2 篇 ferrari elena
  • 1 篇 leithead travis
  • 1 篇 wainer jacques
  • 1 篇 zhou li
  • 1 篇 kumar akhil
  • 1 篇 hulsebosch r.j.
  • 1 篇 anutariya chutip...
  • 1 篇 ebben p.w.g.
  • 1 篇 georg geri
  • 1 篇 iwaihara mizuho
  • 1 篇 li ninghui
  • 1 篇 salden a.m.
  • 1 篇 enck william
  • 1 篇 seamons kent e.
  • 1 篇 neuman clifford
  • 1 篇 beznosov konstan...
  • 1 篇 crampton jason
  • 1 篇 ryutov tatyana
  • 1 篇 steffens ulrike

语言

  • 20 篇 英文
检索条件"任意字段=SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies"
20 条 记 录,以下是1-10 订阅
排序:
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
SACMAT 2005: Proceedings of 10th ACM Symposium on Access Con...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
the proceedings contain 19 papers. the topics discussed include: integrity constraints in trust management;declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastruc... 详细信息
来源: 评论
sacmat'10 - proceedings of the 15th acm symposium on access control models and technologies
SACMAT'10 - Proceedings of the 15th ACM Symposium on Access ...
收藏 引用
15th acm symposium on access control models and technologies, sacmat 2010
the proceedings contain 19 papers. the topics discussed include: a model of triangulating environments for policy authoring;towards analyzing complex operating system access control configurations;monitoring security ...
来源: 评论
proceedings of acm symposium on access control models and technologies, sacmat: Foreword
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
proceedings of acm symposium on access control models and technologies, sacmat 2005年 iii页
作者: Ferrari, Elena Ahn, Gail-Joon
No abstract available
来源: 评论
Future direction of access control models, architectures, and technologies  05
Future direction of access control models, architectures, an...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Beznosov, Konstantin University of British Columbia Canada
No abstract available
来源: 评论
A reference monitor for workflow systems with constrained task execution  05
A reference monitor for workflow systems with constrained ta...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Crampton, Jason Information Security Group Royal Holloway University of London
We describe a model, independent of any underlying access control paradigm, for specifying authorization constraints such as separation of duty and cardinality constraints in workflow systems. We present a number of r... 详细信息
来源: 评论
Adaptive trust negotiation and access control  05
Adaptive trust negotiation and access control
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Ryutov, Tatyana Zhou, Li Neuman, Clifford Leithead, Travis Seamons, Kent E. Information Sciences Institute University of Southern California Marina del Rey CA 90292-6695 Internet Security Research Lab. Brigham Young University Provo UT 84602-6576
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-control environment for such transaction... 详细信息
来源: 评论
A fine-grained, controllable, user-to-user delegation method in RBAC  05
A fine-grained, controllable, user-to-user delegation method...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Wainer, Jacques Kumar, Akhil Institute of Computing State University of Campinas Campinas Brazil Smeal College of Business Penn State University University Park PA United States
this paper addresses the issues surrounding user-to-user delegation in RBAC. We show how delegations can be incorporated into the RBAC model in a simple and straightforward manner. A special feature of the model is th... 详细信息
来源: 评论
Purpose based access control of complex data for privacy protection  05
Purpose based access control of complex data for privacy pro...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Byun, Ji-Won Bertino, Elisa Li, Ninghui CERIAS Department of Computer Sciences Purdue University 656 Oval Drive West Lafayette IN 47907
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development, of privacy protecting technology. We recently proposed a privacy preserving access con... 详细信息
来源: 评论
AC-XML documents: Improving the performance of a web access control module  05
AC-XML documents: Improving the performance of a web access ...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Carminati, Barbara Ferrari, Elena University of Insubria at Como Via Valleggio 11 Como Italy
Protecting information over the web is today becoming a primary need. Although many access control models have been so far proposed to address the specific protection requirements of the web environment, no comparable... 详细信息
来源: 评论
Verifiable composition of access control and application features  05
Verifiable composition of access control and application fea...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Song, Eunjee Reddy, Raghu France, Robert Ray, Indrakshi Georg, Geri Alexander, Roger Computer Science Dept. Colorado State University Fort Collins CO 80523
access control features are often spread across and tangled with other functionality in a design. this makes modifying and replacing these features in a design difficult. Aspect-oriented modeling (AOM) techniques can ... 详细信息
来源: 评论