咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是1-10 订阅
排序:
SacmAT 2024 - Proceedings of the 29th acm symposium on access control models and technologies
SACMAT 2024 - Proceedings of the 29th ACM Symposium on Acces...
收藏 引用
29th acm symposium on access control models and technologies, SacmAT 2024
the proceedings contain 20 papers. the topics discussed include: ToneCheck: unveiling the impact of dialects in privacy policy;make split, not hijack: preventing feature-space hijacking attacks in split learning;makin...
来源: 评论
SacmAT 2023 - Proceedings of the 28th acm symposium on access control models and technologies
SACMAT 2023 - Proceedings of the 28th ACM Symposium on Acces...
收藏 引用
28th acm symposium on access control models and technologies, SacmAT 2023
the proceedings contain 25 papers. the topics discussed include: access control vulnerabilities in network protocol implementations: how attackers exploit them and what to do about it;a framework for privacy-preservin...
来源: 评论
SacmAT 2022 - Proceedings of the 27th acm symposium on access control models and technologies
SACMAT 2022 - Proceedings of the 27th ACM Symposium on Acces...
收藏 引用
27th acm symposium on access control models and technologies, SacmAT 2022
the proceedings contain 29 papers. the topics discussed include: modular composition of access control policies: a framework to build multi-site multi-level combinations;a study of application sandbox policies in Linu...
来源: 评论
SacmAT 2021 - Proceedings of the 26th acm symposium on access control models and technologies
SACMAT 2021 - Proceedings of the 26th ACM Symposium on Acces...
收藏 引用
26th acm symposium on access control models and technologies, SacmAT 2021
the proceedings contain 19 papers. the topics discussed include: backdoor attacks to graph neural networks;analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research;towards a theory for sem...
来源: 评论
Cryptographic Enforcement of access control Policies: models, Applications, and Future Directions  29
Cryptographic Enforcement of Access Control Policies: Models...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Masucci, Barbara Univ Salerno Dept Comp Sci Fisciano Italy
Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements. Among the different techniques ... 详细信息
来源: 评论
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots  29
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Hemken, Niklas Jacob, Florian Teernava, Fabian Kartmann, Rainer Asfour, Tamim Hartenstein, Hannes Karlsruhe Inst Technol Karlsruhe Germany
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they als... 详细信息
来源: 评论
the Category-Based Approach to access control, Obligations and Privacy  23
The Category-Based Approach to Access Control, Obligations a...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Fernandez, Maribel Kings Coll London London England
the category-based access control metamodel provides an axiomatic framework for the specification of access control models. In this talk, we give an overview of the category-based approach to access control, obligatio... 详细信息
来源: 评论
A Bargaining-Game Framework for Multi-Party access control  29
A Bargaining-Game Framework for Multi-Party Access Control
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Mehri, Gelareh Hasel Monmege, Benjamin Bertolissi, Clara Zannone, Nicola Eindhoven Univ Technol Eindhoven Netherlands Aix Marseille Univ CNRS LIS Marseille France
Multi-party access control is emerging to protect shared resources in collaborative environments. Existing multi-party access control models often lack essential features to address the challenges characterizing colla... 详细信息
来源: 评论
Converting Rule-Based access control Policies: From Complemented Conditions to Deny Rules  29
Converting Rule-Based Access Control Policies: From Compleme...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Ruiz, Josue A. Narendran, Paliath Masoumzadeh, Amir Iyer, Padmavathi SUNY Albany Univ Albany Albany NY 12246 USA Drury Univ Springfield MO USA
Using access control policy rules with deny effects (i.e., negative authorization) can be preferred to using complemented conditions in the rules as they are often easier to comprehend in the context of large policies... 详细信息
来源: 评论
A Self-Sovereign Identity Approach to Decentralized access control with Transitive Delegations  29
A Self-Sovereign Identity Approach to Decentralized Access C...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Vrielynck, Pieter-Jan Van hamme, Tim Ghostin, Rawad Lagaisse, Bert Preuveneers, Davy Joosen, Wouter Katholieke Univ Leuven DistriNet B-3001 Leuven Belgium
In this paper, we introduce a new decentralized access control framework with transitive delegation capabilities that tackles the performance and scalability limitations of the existing state-of-the-art solutions. In ... 详细信息
来源: 评论