咨询与建议

限定检索结果

文献类型

  • 19 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 18 篇 计算机科学与技术...
    • 12 篇 控制科学与工程
    • 12 篇 软件工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
  • 4 篇 管理学
    • 4 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 统计学(可授理学、...

主题

  • 8 篇 control system a...
  • 3 篇 access control
  • 2 篇 data privacy
  • 2 篇 xml
  • 1 篇 location-based s...
  • 1 篇 architecture
  • 1 篇 relationship-bas...
  • 1 篇 building constru...
  • 1 篇 data reduction
  • 1 篇 sandbox policy
  • 1 篇 context sensitiv...
  • 1 篇 conflict resolut...
  • 1 篇 linux applicatio...
  • 1 篇 gis
  • 1 篇 privacy
  • 1 篇 multi-party acce...
  • 1 篇 access-control m...

机构

  • 1 篇 beta systems sof...
  • 1 篇 univ genoa dipar...
  • 1 篇 ecole polytech f...
  • 1 篇 offis e.v. esche...
  • 1 篇 purdue univ ceri...
  • 1 篇 north carolina s...
  • 1 篇 telematica insti...
  • 1 篇 computer science...
  • 1 篇 institute of com...
  • 1 篇 dept. social inf...
  • 1 篇 computer science...
  • 1 篇 internet securit...
  • 1 篇 george mason uni...
  • 1 篇 information scie...
  • 1 篇 penn state univ ...
  • 1 篇 university of br...
  • 1 篇 computer science...
  • 1 篇 university of in...
  • 1 篇 univ milan dipar...
  • 1 篇 smeal college of...

作者

  • 2 篇 bertino elisa
  • 2 篇 ferrari elena
  • 1 篇 leithead travis
  • 1 篇 wainer jacques
  • 1 篇 zhou li
  • 1 篇 kumar akhil
  • 1 篇 hulsebosch r.j.
  • 1 篇 anutariya chutip...
  • 1 篇 ebben p.w.g.
  • 1 篇 georg geri
  • 1 篇 iwaihara mizuho
  • 1 篇 li ninghui
  • 1 篇 salden a.m.
  • 1 篇 enck william
  • 1 篇 seamons kent e.
  • 1 篇 neuman clifford
  • 1 篇 beznosov konstan...
  • 1 篇 crampton jason
  • 1 篇 ryutov tatyana
  • 1 篇 steffens ulrike

语言

  • 20 篇 英文
检索条件"任意字段=SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies"
20 条 记 录,以下是11-20 订阅
排序:
Purpose based access control of complex data for privacy protection  05
Purpose based access control of complex data for privacy pro...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Byun, Ji-Won Bertino, Elisa Li, Ninghui CERIAS Department of Computer Sciences Purdue University 656 Oval Drive West Lafayette IN 47907
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development, of privacy protecting technology. We recently proposed a privacy preserving access con... 详细信息
来源: 评论
AC-XML documents: Improving the performance of a web access control module  05
AC-XML documents: Improving the performance of a web access ...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Carminati, Barbara Ferrari, Elena University of Insubria at Como Via Valleggio 11 Como Italy
Protecting information over the web is today becoming a primary need. Although many access control models have been so far proposed to address the specific protection requirements of the web environment, no comparable... 详细信息
来源: 评论
Verifiable composition of access control and application features  05
Verifiable composition of access control and application fea...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Song, Eunjee Reddy, Raghu France, Robert Ray, Indrakshi Georg, Geri Alexander, Roger Computer Science Dept. Colorado State University Fort Collins CO 80523
access control features are often spread across and tangled with other functionality in a design. this makes modifying and replacing these features in a design difficult. Aspect-oriented modeling (AOM) techniques can ... 详细信息
来源: 评论
Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure  05
Declaration and enforcement of fine-grained access restricti...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Matheus, Andreas Fakultät für Informatik Technische Universität München Boltzmannstr. 3 D-85748 Garching
this work describes the declaration and enforcement of geospatial access restrictions for the infrastructure of heterogenous and distributed geospatial information objects, as they are accessible via the service-orien... 详细信息
来源: 评论
Context sensitive access control  05
Context sensitive access control
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Hulsebosch, R.J. Salden, A.M. Bargh, M.S. Ebben, P.W.G. Reitsma, J. Telematica Instituut P.O. Box 589 7500 AN Enschede Netherlands
We investigate the practical feasibility of using context information for controlling access to services. Based solely on situational context, we show that users can be transparently provided anonymous access to servi... 详细信息
来源: 评论
Peer-to-peer access control architecture using trusted computing technology  05
Peer-to-peer access control architecture using trusted compu...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Sandhu, Ravi Zhang, Xinwen George Mason University
It has been recognized for some lime that software alone does not provide an adequate foundation for building a high-assurance trusted platform. the emergence of industry-standard trusted computing technologies promis... 详细信息
来源: 评论
Rule support for role-based access control  05
Rule support for role-based access control
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Kern, Axel Walhorn, Claudia Beta Systems Software AG Josef-Lammerting-Allee 14 50933 Köln Germany
the administration of users and access rights in large enterprises is a complex and challenging task. Role-based access control (RBAC) is a powerful concept for simplifying access control. In particular. Enterprise Ro... 详细信息
来源: 评论
Relevancy based access control of versioned XML documents  05
Relevancy based access control of versioned XML documents
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Iwaihara, Mizuho Chatvichienchai, Somchai Anutariya, Chutiporn Wuwongse, Vilas Dept. Social Informatics Kyoto University Kyoto 606-8501 Japan Dept. Info.-Media Siebold University of Nagasaki Nagasaki 851-2195 Japan Computer Science Program Shinawatra University Pathumthani 12160 Thailand Computer Science and Information Management Program Asian Institute of Technology Pathumthani 12120 Thailand
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependenci... 详细信息
来源: 评论
Role mining with ORCA  05
Role mining with ORCA
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Schlegelmilch, Jürgen Steffens, Ulrike OFFIS e.V. Escherweg 2 26121 Oldenburg Germany
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, security demands a tight regime on permissi... 详细信息
来源: 评论
Provable bounds for portable and flexible privacy-preserving access rights
Provable bounds for portable and flexible privacy-preserving...
收藏 引用
sacmat 2005: proceedings of 10th acm symposium on access control models and technologies
作者: Blanton, Marina Atallah, Mikhail J. Department of Computer Science Purdue University
In this work we address the problem of portable and flexible privacy-preserving access rights for large online data repositories. Privacy-preserving access control means that the service provider can neither learn wha... 详细信息
来源: 评论