咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是111-120 订阅
排序:
Securing Content in Decentralized Online Social Networks:Solutions, Limitations, and the Road Ahead  22
Securing Content in Decentralized Online Social Networks&#58...
收藏 引用
Proceedings of the 27th acm on symposium on access control models and technologies
作者: Roberto Di Pietro Hamad Bin Khalifa University Doha Qatar
the most popular On-line Social Networks (OSNs) are based on centralized architectures where service providers (e.g., Facebook, Twitter, or Instagram) have full control over the data published by their user---a requir... 详细信息
来源: 评论
Visual Language for Device Management in Telecommunication Product Line  10th
Visual Language for Device Management in Telecommunication P...
收藏 引用
10th International Conference on New Trends in Model and Data Engineering, MEDI 2021 held with 4th International Workshop on Modeling, Verification and Testing of Dependable Critical Systems, DETECT 2021, symposium on Intelligent and Autonomous Systems, SIAS 2021, 1st Workshop on control Software: Methods, models, and Languages, CSMML 2021, Workshop on Blockchain for Inter-Organizational Collaboration, BIOC 2021 and 1st International Health Data Workshop, HEDA 2021
作者: Semenov, Eugeny Kai, Sheng Gen, Chen Luciv, Dmitry Koznov, Dmitry Huawei Technologies Co. Ltd. Shenzhen China Saint-Petersburg State University Saint Petersburg Russia Alferov University RAS Saint Petersburg Russia
In the present paper, we consider the task of creating hardware specifications for telecommunication devices that close the communication gap between hardware engineers and software developers. this task has arisen du... 详细信息
来源: 评论
Poster: Unified access control for Surgical Robotics  19
Poster: Unified Access Control for Surgical Robotics
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Shah, Ryan Nagaraja, Shishir Univ Strathclyde Glasgow Lanark Scotland
来源: 评论
Blockchain-based access control Mechanism of Federated Data Sharing System  18
Blockchain-based Access Control Mechanism of Federated Data ...
收藏 引用
18th IEEE Int Symp on Parallel and Distributed Proc with Applicat (ISPA) / 10th IEEE Int Conf on Big Data and Cloud Comp (BDCloud) / IEEE Int Symp on Social Comp and Networking (SocialCom) / IEEE Int Conf on Sustainable Comp and Commun (SustainCom)
作者: Ding, Yan Feng, Liaoliao Qin, Ying Dong, Pan Huang, Chenlin Gao, Long Tan, Yusong Natl Univ Def Technol Sch Comp Changsha Peoples R China
Sharing data assets has emerged among organizations with variable interest, especially in the manner of federation. Blockchain has been used in data sharing systems to provide the audit and access control on data beca... 详细信息
来源: 评论
An Overview of Smart Wheelchair technologies  10th
An Overview of Smart Wheelchair Technologies
收藏 引用
10th International Conference on Health Informatics and Medical Systems, HIMS 2024 and 10th International Conference on Biomedical Engineering, BIOENG 2024, held as part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024
作者: Kovacevic, Nikol Ahmad, Ishfaq Clark, Addison Saifullah, Khalid University of Texas at Arlington ArlingtonTX76017 United States
Many individuals who are in need of mobility assistance do not have access to the proper wheelchair for their type of mobility disability. there is growing research towards creating smart wheelchairs using a variety o... 详细信息
来源: 评论
Mutual Authorizations: Semantics and Integration Issues  19
Mutual Authorizations: Semantics and Integration Issues
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Suntaxi, Gabriela El Ghazi, Aboubakr Achraf Boehm, Klemens Karlsruhe Inst Technol Karlsruhe Germany
Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing access control models however captures this reciprocity phenomenon. In t... 详细信息
来源: 评论
Generalized Mining of Relationship-Based access control Policies in Evolving Systems  19
Generalized Mining of Relationship-Based Access Control Poli...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Relationship-based access control (ReBAC) provides a flexible approach to specify policies based on relationships between system entities, which makes them a natural fit for many modern information systems, beyond onl... 详细信息
来源: 评论
An OpenRBAC Semantic Model for access control in Vehicular Networks  19
An OpenRBAC Semantic Model for Access Control in Vehicular N...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Alsarra, Sultan Yen, I-Ling Huang, Yongtao Bastani, Farokh thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
Inter-vehicle communication has the potential to significantly improve driving safety, but also raises security concerns. the fundamental mechanism to govern information sharing behaviors is access control. Since vehi... 详细信息
来源: 评论
CMCAP: Ephemeral Sandboxes for Adaptive access control  19
CMCAP: Ephemeral Sandboxes for Adaptive Access Control
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Bucuti, theogene Hakiza Dantu, Ram Morozov, Kirill Univ North Texas Dept Comp Sci & Engn Denton TX 76203 USA
We present CMCAP (context-mapped capabilities), a decentralized mechanism for specifying and enforcing adaptive access control policies for resource-centric security. Policies in CMCAP express runtime constraints defi... 详细信息
来源: 评论
Edge-to-Fog Collaborative Computing in a Swarm of Drones  10th
Edge-to-Fog Collaborative Computing in a Swarm of Drones
收藏 引用
10th International Conference on New Trends in Model and Data Engineering, MEDI 2021 held with 4th International Workshop on Modeling, Verification and Testing of Dependable Critical Systems, DETECT 2021, symposium on Intelligent and Autonomous Systems, SIAS 2021, 1st Workshop on control Software: Methods, models, and Languages, CSMML 2021, Workshop on Blockchain for Inter-Organizational Collaboration, BIOC 2021 and 1st International Health Data Workshop, HEDA 2021
作者: Rahbari, Dadmehr Mahtab Alam, Muhammad Le Moullec, Yannick Jenihhin, Maksim Thomas Johann Seebeck Department of Electronics Tallinn University of Technology Ehitajate tee 5 Tallinn19086 Estonia Department of Computer Systems Tallinn University of Technologies Akadeemia tee 15A Tallinn12618 Estonia
Recently, drones technology started unleashing numerous novel applications and services and became one of the killer applications for the Mobile Edge Computing (MEC) paradigm. the main challenge for real-time applicat... 详细信息
来源: 评论