咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是121-130 订阅
排序:
CAOS: Concurrent-access Obfuscated Store  19
CAOS: Concurrent-Access Obfuscated Store
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Ordean, Mihai Ryan, Mark Galindo, David Univ Birmingham Birmingham W Midlands England Fetch AI Cambridge England
this paper proposes Concurrent-access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidt... 详细信息
来源: 评论
CloudProtect - A Cloud-based Software Protection Service  19
CloudProtect - A Cloud-based Software Protection Service
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Schaad, Andreas Grohmann, Bjeorn Winzenried, Oliver Univ Appl Sci Offenburg Badstr 24 D-77652 Offenburg Germany Wibu Syst AG Ruppurer Str 52 D-76137 Karlsruhe Germany
Protecting software from illegal access, intentional modification or reverse engineering is an inherently difficult practical problem involving code obfuscation techniques and real-time cryptographic protection of cod... 详细信息
来源: 评论
On the potential of distance bounding based on UWB received signal strength  10
On the potential of distance bounding based on UWB received ...
收藏 引用
10th International Conference on Pervasive and Parallel Computing, Communication and Sensors, PECCS 2020
作者: Botler, Leo Ribeiro, Leandro Batista Diwold, Konrad Römer, Kay Institute for Technical Informatics Graz University of Technology Austria Pro2Future Austria
Distance bounding has gained attention in the last decades due to the increasing need for security in applications, such as contactless payment and keyless access control. In such applications, it is important to veri... 详细信息
来源: 评论
HITC: Data Privacy in Online Social Networks with Fine-Grained access control  19
HITC: Data Privacy in Online Social Networks with Fine-Grain...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Abdulla, Ahmed Khalil Bakiras, Spiridon Hamad Bin Khalifa Univ Coll Sci & Engn Div Informat & Comp Technol Doha Qatar
Online Social Networks (OSNs), such as Facebook and Twitter, are popular platforms that enable users to interact and socialize through their networked devices. the social nature of such applications encourages users t... 详细信息
来源: 评论
Speckle-contrast imaging of pathological tissue microhemodynamics in the development of various diabetes models  7
Speckle-contrast imaging of pathological tissue microhemodyn...
收藏 引用
Saratov Fall Meeting (SFM) / 7th International symposium on Optics and Biophotonics - Optical and Nano-technologies for Biology and Medicine
作者: Dyachenko (Timoshina), Polina A. Alexandrov, Denis A. Bucharskaya, Alla B. Tuchin, Valery V. Saratov NG Chernyshevskii State Univ Res Educ Inst Opt & Biophoton Saratov Russia Tomsk State Univ Interdisciplinary Lab Biophoton Tomsk Russia Saratov State Med Univ Saratov Russia RAS Inst Precis Mech & Control Lab Laser Diagnost Tech & Living Syst Moscow Russia
the study of blood microcirculation is one of the most important problems of the medicine. this is caused by the fact that many diseases, such as cardio-vascular diseases, atherosclerosis, diabetes, chronic venous ins... 详细信息
来源: 评论
Brokering Policies and Execution Monitors for IoT Middleware  19
Brokering Policies and Execution Monitors for IoT Middleware
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Carranza, Juan Carlos Fuentes Fong, Philip W. L. Univ Calgary Calgary AB Canada
Event-based systems lie at the heart of many cloud-based Internet-of-things (IoT) platforms. this combination of the Broker architectural style and the Publisher-Subscriber design pattern provides a way for smart devi... 详细信息
来源: 评论
Toward Detection of access control models from Source Code via Word Embedding  19
Toward Detection of Access Control Models from Source Code v...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Heaps, John Wang, Xiaoyin Breaux, Travis Niu, Jianwei Univ Texas San Antonio San Antonio TX 78249 USA Carnegie Mellon Univ Pittsburgh PA 15213 USA
Advancement in machine learning techniques in recent years has led to deep learning applications on source code. While there is little research available on the subject, the work that has been done shows great potenti... 详细信息
来源: 评论
A Rule-based Approach to the Decidability of Safety of ABACα  19
A Rule-based Approach to the Decidability of Safety of ABACα
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Marin, Mircea Kutsia, Temur Dundua, Besik West Univ Timisoara Timisoara Romania Johannes Kepler Univ Linz RISC Linz Austria Tbilisi State Univ VIAM Tbilisi Georgia Int Black Sea Univ Tbilisi Georgia
ABAC(alpha) is a foundational model for attribute-based access control with a minimal set of capabilities to configure many access control models of interest, including the dominant traditional ones: discretionary (DA... 详细信息
来源: 评论
Towards Effective Verification of Multi-Model access control Properties  19
Towards Effective Verification of Multi-Model Access Control...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Berger, Bernhard J. Maeder, Christian Nguempnang, Rodrigue Wete Sohr, Karsten Rubio-Medrano, Carlos Univ Bremen Bremen Germany Arizona State Univ Tempe AZ USA
Many existing software systems like logistics systems or enterprise applications employ data security in a more or less ad hoc fashion. Our approach focuses on access control such as permission-based discretionary acc... 详细信息
来源: 评论
Efficient and Extensible Policy Mining for Relationship-Based access control  19
Efficient and Extensible Policy Mining for Relationship-Base...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Bui, thang Stoller, Scott D. Le, Hieu SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities. ReBAC policy... 详细信息
来源: 评论