咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是161-170 订阅
排序:
Multimodal interaction in process control rooms: Are we there yet?  16
Multimodal interaction in process control rooms: Are we ther...
收藏 引用
5th acm International symposium on Pervasive Displays, PerDis 2016
作者: Heimonen, Tomi Hakulinen, Jaakko Sharma, Sumita Turunen, Markku Lehtikunnas, Lauri Paunonen, Hannu University of Wisconsin - Stevens Point Stevens PointWI United States TAUCHI University of Tampere Finland Valmet Automation Tampere Finland
Although process control rooms are advanced digital environments with a multitude of desktop and large displays, there still exists a gap between the interaction technologies being employed in pervasive displays used ... 详细信息
来源: 评论
Trust enhanced secure role-based access control on encrypted data in cloud (Abstract of keynote talk)  10th
Trust enhanced secure role-based access control on encrypted...
收藏 引用
10th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016
作者: Varadharajan, Vijay Department of Computing Faculty of Science Macquarie University NSW2109 Australia
In this talk I will begin with a brief look at current trends in the technology scenery and some of the key security challenges that are impacting on business and society. In particular, on the one hand there have bee... 详细信息
来源: 评论
SacmAT 2014 - Proceedings of the 19th acm symposium on access control models and technologies
SACMAT 2014 - Proceedings of the 19th ACM Symposium on Acces...
收藏 引用
19th acm symposium on access control models and technologies, SacmAT 2014
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based access control;an access control concept for novel automotive HMI systems;monitor placem...
来源: 评论
Privacy and access control;How are these twoconcepts related?  15
Privacy and access control;How are these twoconcepts related...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Squicciarini, Anna Yu, Ting College of Information Sciences and Technology Pennsylvania State University United States Qatar Computing Research Institute Doha Qatar
No abstract available.
来源: 评论
access control in Publicly Verifiable Outsourced Computation  15
Access control in Publicly Verifiable Outsourced Computation
收藏 引用
10th acm symposium on Information, Computer and Communications Security, ASIACCS 2015
作者: Alderman, James Janson, Christian Cid, Carlos Crampton, Jason Information Security Group Royal Holloway University of London Egham SurreyTW20 0EX United Kingdom
Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources to delegate computations to more powerful external servers, and to verify the correctness of results. Whilst beneficial in many... 详细信息
来源: 评论
Full-System Simulation of *** Multicore Architecture for Performance and Energy Exploration
Full-System Simulation of *** Multicore Architecture for Per...
收藏 引用
IEEE International symposium on Embedded Multicore Socs (MCSoC)
作者: Anastasiia Butko Florent Bruguier Abdoulaye Gamatié Gilles Sassatelli David Novo Lionel Torres Michel Robert Gilles Sassatelli University of Montpellier Montpellier France Communaute d'Universites et Etablissements Languedoc-Roussillon Universites Montpellier Languedoc-Roussillon FR
Single-ISA heterogeneous multicore processors have gained increasing popularity with the introduction of recent technologies such as ARM ***. these processors offer increased energy efficiency through combining low po... 详细信息
来源: 评论
Hard instances for verification problems in access control  15
Hard instances for verification problems in access control
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Mousavi, Nima Tripunitara, Mahesh Google Inc. Waterloo Canada ECE University of Waterloo Waterloo Canada
We address the generation and analysis of hard instances for verification problems in access control that are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu... 详细信息
来源: 评论
A logical approach to restricting access in online social networks  15
A logical approach to restricting access in online social ne...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Cramer, Marcos Pang, Jun Zhang, Yang University of Luxembourg Luxembourg
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de... 详细信息
来源: 评论
Commune: Shared ownership in an agnostic cloud  15
Commune: Shared ownership in an agnostic cloud
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Soriente, Claudio Karame, Ghassan O. Ritzdorf, Hubert Marinovic, Srdjan Capkun, Srdjan ETH Zurich Switzerland NEC Laboratories Germany Wireless Registry Inc. United States
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes access control decisions. Existing cloud... 详细信息
来源: 评论
Automated inference of access control policies For web applications  15
Automated inference of access control policies For web appli...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Le, Ha thanh Nguyen, Cu D. Briand, Lionel Hourte, Benjamin University of Luxembourg Luxembourg Luxembourg HITEC Luxembourg S.A. LuxembourgL-1458 Luxembourg
In this paper, we present a novel, semi-automated approach to infer access control policies automatically for web-based applications. Our goal is to support the validation of implemented access control policies, even ... 详细信息
来源: 评论