全文获取类型
收费全文 | 267篇 |
免费 | 16篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 5篇 |
综合类 | 4篇 |
化学工业 | 15篇 |
金属工艺 | 6篇 |
机械仪表 | 7篇 |
建筑科学 | 37篇 |
能源动力 | 1篇 |
轻工业 | 2篇 |
水利工程 | 13篇 |
石油天然气 | 9篇 |
无线电 | 15篇 |
一般工业技术 | 15篇 |
冶金工业 | 35篇 |
自动化技术 | 127篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 15篇 |
2020年 | 8篇 |
2019年 | 9篇 |
2018年 | 10篇 |
2017年 | 6篇 |
2016年 | 5篇 |
2015年 | 9篇 |
2014年 | 16篇 |
2013年 | 10篇 |
2012年 | 11篇 |
2011年 | 15篇 |
2010年 | 3篇 |
2009年 | 11篇 |
2008年 | 12篇 |
2007年 | 9篇 |
2006年 | 9篇 |
2005年 | 9篇 |
2004年 | 16篇 |
2003年 | 9篇 |
2002年 | 10篇 |
2001年 | 6篇 |
2000年 | 7篇 |
1999年 | 9篇 |
1998年 | 16篇 |
1997年 | 12篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1980年 | 1篇 |
1976年 | 2篇 |
排序方式: 共有291条查询结果,搜索用时 31 毫秒
1.
In 2004, the American National Standards Institute approved the Role-Based Access Control standard to fulfill "a need among government and industry purchasers of information technology products for a consistent and uniform definition of role based access control (RBAC) features". Such uniform definitions give IT product vendors and customers a common and unambiguous terminology for RBAC features, which can lead to wider adoption of RBAC and increased productivity. However, the current ANSI RBAC Standard has several limitations, design flaws, and technical errors that, it unaddressed, could lead to confusions among IT product vendors and customers and to RBAC implementations with different semantics, thus defeating the standard's purpose. 相似文献
2.
3.
4.
5.
Elisa Bertino Giovanna Guerrini Marco Mesiti 《Journal of Intelligent Information Systems》2008,30(1):55-92
Measuring the structural similarity between an XML document and a DTD has many relevant applications that range from document
classification and approximate structural queries on XML documents to selective dissemination of XML documents and document
protection. The problem is harder than measuring structural similarity among documents, because a DTD can be considered as
a generator of documents. Thus, the problem is to evaluate the similarity between a document and a set of documents. An effective
structural similarity measure should face different requirements that range from considering the presence and absence of required
elements, as well as the structure and level of the missing and extra elements to vocabulary discrepancies due to the use
of synonymous or syntactically similar tags. In the paper, starting from these requirements, we provide a definition of the
measure and present an algorithm for matching a document against a DTD to obtain their structural similarity. Finally, experimental
results to assess the effectiveness of the approach are presented. 相似文献
6.
Dan Lin Prathima Rao Elisa Bertino Ninghui Li Jorge Lobo 《International Journal of Information Security》2010,9(4):253-273
Policy integration and inter-operation is often a crucial requirement when parties with different access control policies
need to participate in collaborative applications and coalitions. Such requirement is even more difficult to address for dynamic
large-scale collaborations, in which the number of access control policies to analyze and compare can be quite large. An important
step in policy integration and inter-operation is to analyze the similarity of policies. Policy similarity can sometimes also
be a pre-condition for establishing a collaboration, in that a party may enter a collaboration with another party only if
the policies enforced by the other party match or are very close to its own policies. Existing approaches to the problem of
analyzing and comparing access control policies are very limited, in that they only deal with some special cases. By recognizing
that a suitable approach to the policy analysis and comparison requires combining different approaches, we propose in this
paper a comprehensive environment—EXAM. The environment supports various types of analysis query, which we categorize in the
paper. A key component of such environment, on which we focus in the paper, is the policy analyzer able to perform several
types of analysis. Specifically, our policy analyzer combines the advantages of existing MTBDD-based and SAT-solver-based
techniques. Our experimental results, also reported in the paper, demonstrate the efficiency of our analyzer. 相似文献
7.
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited purpose in the model. It allows users using some data for certain purpose with conditions. The structure of conditional purpose-based access control model is defined and investigated through dynamic roles. Access purpose is verified in a dynamic behavior, based on subject attributes, context attributes and authorization policies. Intended purposes are dynamically associated with the requested data object during the access decision. An algorithm is developed to achieve the compliance computation between access purposes and intended purposes and is illustrated with Role-based access control (RBAC) in a dynamic manner to support conditional purpose-based access control. According to this model, more information from data providers can be extracted while at the same time assuring privacy that maximizes the usability of consumers’ data. It extends traditional access control models to a further coverage of privacy preserving in data mining atmosphere. The structure helps enterprises to circulate clear privacy promise, to collect and manage user preferences and consent. 相似文献
8.
A distributed approach to enabling privacy-preserving model-based classifier training 总被引:4,自引:4,他引:0
Hangzai Luo Jianping Fan Xiaodong Lin Aoying Zhou Elisa Bertino 《Knowledge and Information Systems》2009,20(2):157-185
This paper proposes a novel approach for privacy-preserving distributed model-based classifier training. Our approach is an
important step towards supporting customizable privacy modeling and protection. It consists of three major steps. First, each
data site independently learns a weak concept model (i.e., local classifier) for a given data pattern or concept by using
its own training samples. An adaptive EM algorithm is proposed to select the model structure and estimate the model parameters simultaneously. The second step deals with combined classifier training by integrating the weak concept models that are shared from multiple data sites. To reduce the data transmission costs and
the potential privacy breaches, only the weak concept models are sent to the central site and synthetic samples are directly generated from these shared weak concept models at the central site. Both the shared weak concept models and
the synthetic samples are then incorporated to learn a reliable and complete global concept model. A computational approach is developed to automatically achieve a good trade off between the privacy disclosure risk, the
sharing benefit and the data utility. The third step deals with validating the combined classifier by distributing the global
concept model to all these data sites in the collaboration network while at the same time limiting the potential privacy breaches.
Our approach has been validated through extensive experiments carried out on four UCI machine learning data sets and two image
data sets.
相似文献
Jianping FanEmail: |
9.
P. Mazzoleni B. Crispo S. Sivasubramanian E. Bertino 《The Journal of supercomputing》2009,49(1):108-126
In this paper, we present a novel resource brokering service for grid systems which considers authorization policies of the
grid nodes in the process of selecting the resources to be assigned to a request. We argue such an integration is needed to
avoid scheduling requests onto resources the policies of which do not authorize their execution. Our service, implemented
in Globus as a part of Monitoring and Discovery Service (MDS), is based on the concept of fine-grained access control (FGAC) which enables participating grid nodes to specify fine-grained policies concerning the conditions under which grid
clients can access their resources. Since the process of evaluating authorization policies, in addition to checking the resource
requirements, can be a potential bottleneck for a large scale grid, we also analyze the problem of the efficient evaluation
of FGAC policies. In this context, we present GroupByRule, a novel method for policy organization and compare its performance with other strategies.
相似文献
E. BertinoEmail: |
10.
Bertino E. Ferrari E. Stolf M. 《Knowledge and Data Engineering, IEEE Transactions on》2000,12(1):102-125
Multimedia presentations are composed of objects belonging to different data types such as video, audio, text and image. An important aspect is that, quite often, the user defining a presentation needs to express sophisticated temporal and spatial constraints among the objects composing the presentation. We present a system (called MPGS-Multimedia Presentation Generator System) which supports the specification of constraints among multimedia objects and the generation of multimedia presentations according to the specified constraints. The constraint model provided by MPGS is very flexible and powerful in terms of the kinds of object constraints it can represent. A large number of innovative features are supported including: asynchronous and simultaneous spatial constraints; components of interest and priority levels; motion functions. Obviously, the flexibility provided to the users requires the development of nontrivial techniques to check constraint consistency and to generate a presentation satisfying the specified constraints. We illustrate the solutions we have devised in the framework of MPGS 相似文献