咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是101-110 订阅
排序:
Benchmarking UAQ Solvers  20
Benchmarking UAQ Solvers
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Armando, Alessandro Gazzarata, Giorgia Turkmen, Fatih Univ Genoa DIBRIS Genoa Italy Univ Groningen Groningen Netherlands
the User Authorization Query (UAQ) Problem is key for RBAC systems that aim to offer permission level user-system interaction, where the system automatically determines the roles to activate in order to enable the req... 详细信息
来源: 评论
Norm-based access control  20
Norm-based Access Control
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Ulusoy, Onuralp Yolum, Pinar Univ Utrecht Utrecht Netherlands
Collaborative systems, such as online social networks or Internet of things, host vast amounts of content that is created and manipulated by multiple users. Co-edited documents or group pictures are prime examples of ... 详细信息
来源: 评论
ABAC-CC: Attribute-Based access control and Communication control for Internet of things  20
ABAC-CC: Attribute-Based Access Control and Communication Co...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Bhatt, Smriti Sandhu, Ravi Texas A&M Univ Dept Comp & Cyber Secur San Antonio TX 78224 USA Texas A&M Univ Inst Cyber Secur San Antonio TX USA Texas A&M Univ CREST C SPECC Dept Comp Sci San Antonio TX USA
Internet of things (IoT) is revolutionizing the capabilities of the Internet with billions of connected devices in the cyberspace. these devices are commonly referred to as smart things enabling smart environments, su... 详细信息
来源: 评论
Session details: Session 2: access control models  21
Session details: Session 2: Access Control Models
收藏 引用
Proceedings of the 26th acm symposium on access control models and technologies
作者: Eleonora Losiouk University of Padova
No abstract available.
来源: 评论
Usages of the ContSys Standard: A Position Paper  10th
Usages of the ContSys Standard: A Position Paper
收藏 引用
10th International Conference on New Trends in Model and Data Engineering, MEDI 2021 held with 4th International Workshop on Modeling, Verification and Testing of Dependable Critical Systems, DETECT 2021, symposium on Intelligent and Autonomous Systems, SIAS 2021, 1st Workshop on control Software: Methods, models, and Languages, CSMML 2021, Workshop on Blockchain for Inter-Organizational Collaboration, BIOC 2021 and 1st International Health Data Workshop, HEDA 2021
作者: Kankainen, Kristian Department of Health Technologies Tallinn University of Technology Ehitajate tee 5 Tallinn19086 Estonia
this position paper presents preliminary findings from an ongoing systematic literature review over the usages of the ContSys standard ISO 13940 [7]. I show that the literature reveals several patterns of how "A ... 详细信息
来源: 评论
Analysis of access control Enforcement in Android  20
Analysis of Access Control Enforcement in Android
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Enck, William North Carolina State Univ Raleigh NC 27695 USA
Over the past decade, the Android operating system install-base has proliferated to billions of devices, rivaling Microsoft Windows as a top computing platform. One of the most attractive aspects of Android is its vas... 详细信息
来源: 评论
Automated Strong Mutation Testing of XacmL Policies  20
Automated Strong Mutation Testing of XACML Policies
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Xu, Dianxiang Shrestha, Roshan Shen, Ning Univ Missouri Dept Comp Sci Elect Engn Kansas City MO USA Boise State Univ Dept Comp Sci Boise ID 83725 USA
While the existing methods for testing XacmL policies have varying levels of effectiveness, none of them can reveal the majority of policy faults. the undisclosed faults may lead to unauthorized access and denial of s... 详细信息
来源: 评论
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies  20
Proactive Risk Assessment for Preventing Attribute-Forgery A...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Rubio-Medrano, Carlos E. Claramunt, Luis Jogani, Shaishavkumar Ahn, Gail-Joon Arizona State Univ Tempe AZ 85287 USA
Recently, the use of well-defined, security-relevant pieces of run-time information, a.k.a., attributes, has emerged as a convenient paradigm for writing, enforcing, and maintaining authorization policies, allowing fo... 详细信息
来源: 评论
Protecting Sensitive Data in Web of Data  10th
Protecting Sensitive Data in Web of Data
收藏 引用
10th International Conference on New Trends in Model and Data Engineering, MEDI 2021 held with 4th International Workshop on Modeling, Verification and Testing of Dependable Critical Systems, DETECT 2021, symposium on Intelligent and Autonomous Systems, SIAS 2021, 1st Workshop on control Software: Methods, models, and Languages, CSMML 2021, Workshop on Blockchain for Inter-Organizational Collaboration, BIOC 2021 and 1st International Health Data Workshop, HEDA 2021
作者: Benaribi, Fethi Imad Malki, Mimoun Faraoun, Kamel Mohamed EEDIS Laboratory Djillali Liabes University of Sidi Bel Abbes Sidi Bel Abbès Algeria Sidi Bel Abbès Algeria
Over the last few years, the web of data has been increased. It permitted sharing and an interconnection of a large data in several domains and it keeps increasing day by day. However, certain sectors such as health, ... 详细信息
来源: 评论
BigMEC: Scalable Service Migration for Mobile Edge Computing
BigMEC: Scalable Service Migration for Mobile Edge Computing
收藏 引用
IEEE/acm symposium on Edge Computing (SEC)
作者: Florian Brandherm Julien Gedeon Osama Abboud Max Mühlhäuser Telecooperation Lab TU Darmstadt Germany Huawei Technologies Munich Germany
the proximity of Mobile Edge Computing offers the potential for offloading low latency closed-loop applications from mobile devices. However, to repair decreases in quality of service (QoS), e.g., resulting from user ... 详细信息
来源: 评论