首页> 外文会议>Proceedings of the 15th ACM symposium on access control models and technologies >Solving the Access-Control Puzzle: Finding the Pieces and Putting Them Together
【24h】

Solving the Access-Control Puzzle: Finding the Pieces and Putting Them Together

机译:解决访问控制难题:找到碎片并将它们放在一起

获取原文
获取原文并翻译 | 示例

摘要

Research in access control ranges from the theoretical to the practical, and often involves the consideration of a variety of questions related to system and model design, analysis, deployment, evaluation, and end-user acceptability. Each of these areas of research in access control contains a wealth of research topics. For instance, the umbrella of theoretical considerations includes a diverse array of topics including access-control models, authorization logics, and cryptographic primitives for enforcing disclosure controls; systems considerations include PKI development and deployment, the design of trustworthy hardware, and trustworthy protocol design and analysis; and user considerations can range from user-interface metaphors and approaches to strategies for evaluating the usability of access-control systems in situ.
机译:访问控制的研究范围从理论到实践,并且经常涉及对与系统和模型设计,分析,部署,评估以及最终用户可接受性相关的各种问题的考虑。访问控制的每个这些研究领域都包含许多研究主题。例如,理论上的考虑包括各种各样的主题,包括访问控制模型,授权逻辑和用于执行公开控制的密码原语。系统考虑因素包括PKI开发和部署,可信赖的硬件设计以及可信赖的协议设计和分析;用户的考虑范围从用户界面隐喻和方法到评估就地访问控制系统可用性的策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号