咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 3 篇 access control l...
  • 1 篇 performance prob...
  • 1 篇 access control
  • 1 篇 graph database
  • 1 篇 xml
  • 1 篇 xacml
  • 1 篇 computer securit...
  • 1 篇 semantic web
  • 1 篇 multimedia
  • 1 篇 computer languag...
  • 1 篇 policies increas...
  • 1 篇 graph theory
  • 1 篇 databases
  • 1 篇 modeling xacml s...
  • 1 篇 representing xac...
  • 1 篇 security policie...
  • 1 篇 data structures
  • 1 篇 modeling storing...
  • 1 篇 solutions increa...
  • 1 篇 graph databases

机构

  • 1 篇 kings coll londo...
  • 1 篇 univ bourgogne l...
  • 1 篇 univ london impe...
  • 1 篇 northeastern uni...
  • 1 篇 northeastern uni...
  • 1 篇 newcastle univ s...
  • 1 篇 univ carlos iii ...

作者

  • 1 篇 chbeir richard
  • 1 篇 missier paolo
  • 1 篇 suarez touceda d...
  • 1 篇 al bouna bechara
  • 1 篇 marrara stefania
  • 1 篇 sierra camara jo...
  • 1 篇 paniagua diez fi...
  • 1 篇 danger roxana
  • 1 篇 bryans jeremy
  • 1 篇 vasu amrutha chi...
  • 1 篇 curcin vasa

语言

  • 3 篇 英文
检索条件"主题词=Access Control Language"
3 条 记 录,以下是1-10 订阅
排序:
A Multimedia access control language For Virtual and Ambient Intelligence Environments
A Multimedia Access Control Language For Virtual and Ambient...
收藏 引用
ACM Workshop on Secure Web Services
作者: Al Bouna, Bechara Chbeir, Richard Marrara, Stefania Univ Bourgogne LE2I CNRS F-21078 Dijon France
access control models are becoming increasingly important in several application domains especially in distributed environments like those addressed by Web Services. Established approaches such as DAC [16], MAC [16] R... 详细信息
来源: 评论
access control and view generation for provenance graphs
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2015年 49卷 8-27页
作者: Danger, Roxana Curcin, Vasa Missier, Paolo Bryans, Jeremy Univ London Imperial Coll Sci Technol & Med Dept Comp London SW7 2AZ England Kings Coll London Dept Primary Care & Publ Hlth Sci London SE1 3QD England Newcastle Univ Sch Comp Sci Newcastle Upon Tyne NE1 7RU Tyne & Wear England
Data provenance refers to the knowledge about data sources and operations carried Out to obtain some piece of data. A provenance-enabled system maintains record of the interoperation of processes across different modu... 详细信息
来源: 评论
Modeling XACML Security Policies Using Graph Databases
收藏 引用
IT PROFESSIONAL 2017年 第6期19卷 52-57页
作者: Paniagua Diez, Fidel Vasu, Amrutha Chikkanayakanahalli Suarez Touceda, Diego Sierra Camara, Jose Maria Univ Carlos III Madrid Evalues Lab IT Secur Evaluat Madrid Spain Northeastern Univ Boston MA 02115 USA Northeastern Univ Coll Comp & Informat Sci Boston MA 02115 USA
XACML policies can be presented in a graph data structure, but while these solutions increase performance, they also drastically decrease functionality. To address this, the authors' approach models and stores XAC... 详细信息
来源: 评论