咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是191-200 订阅
排序:
the group data access control method in content centric network
The group data access control method in content centric netw...
收藏 引用
Asia-Pacific symposium on Information and Telecommunication technologies (APSITT)
作者: Shouhei Nagai Takahiro Kaida Osamu Mizuno Graduate School of Electrical Engineering and Electronics Kogakuin University Tokyo Japan
Usage of the Internet for content delivery is increasing. Content Delivery Network is proposed for efficient content delivery in an IP network. However, there are some issues, including over load to content servers, a... 详细信息
来源: 评论
the dynamic network configuration method that reflects user requests using openflow
The dynamic network configuration method that reflects user ...
收藏 引用
Asia-Pacific symposium on Information and Telecommunication technologies (APSITT)
作者: Takeshi Oowari Ayumu Yoshine Osamu Mizuno Graduate School of Electrical and Electronic Engineering Kogakuin University Tokyo Japan
Business network is designed to match their organizational structure. therefore, network reconfiguration is required to meet change of organizational structure and requirements from users. However, quick and detailed ... 详细信息
来源: 评论
Sleep control considering relay node information in mobile Ad-hoc networks
Sleep control considering relay node information in mobile A...
收藏 引用
Asia-Pacific symposium on Information and Telecommunication technologies (APSITT)
作者: Takashige Inoue Shigeki Shiokawa Kanagawa Institute of Technology Kanagawa Inst. Tech. Atsugi Kanagawa Japan
In mobile ad-hoc networks (MANET), the suppression of energy consumption is very important, because the networks may be used in situations with disaster or lacking of infrastructures. In our study, we propose a sleep ... 详细信息
来源: 评论
An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms
An evaluation of the Reed-Solomon error-correcting codes usa...
收藏 引用
International symposium on Applied Computational Intelligence and Informatics ( SACI)
作者: Marius-Alexandru Velciu Alecsandru Pătrascu Victor-Valeriu Patriciu Advanced Technologies Institute Bucharest Romania Computer Science Department Military Technical Academy Bucharest Romania
Bio-cryptography represents a relative new and emerging domain, which proposes to strengthen the usual biometric systems, by adding the traditional cryptography layer to their architecture. Its main benefit lies in th... 详细信息
来源: 评论
Challenges in Making access control Sensitive to the "Right" Contexts  15
Challenges in Making Access Control Sensitive to the "Right"...
收藏 引用
Proceedings of the 20th acm symposium on access control models and technologies
作者: Trent Jaeger Pennsylvania State University University Park PA USA
access control is a fundamental security mechanism that both protects processes from attacks and confines compromised processes that may try to propagate an attack. Nonetheless, we still see an ever increasing number ... 详细信息
来源: 评论
Redaction based RDF access control Language  14
Redaction based RDF Access Control Language
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Rachapalli, Jyothsna Khadilkar, Vaibhav Kantarcioglu, Murat thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
We propose an access control language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF access control. the access control language ... 详细信息
来源: 评论
access control models for Geo-Social Computing Systems  14
Access Control Models for Geo-Social Computing Systems
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Tarameshloo, Ebrahim Fong, Philip W. L. Univ Calgary Dept Comp Sci Calgary AB Canada
A Geo-Social Computing System (GSCS) allows users to declare their current locations, and uses these declared locations to make authorization decisions. Recent years have seen the emergence of a new generation of soci... 详细信息
来源: 评论
Anomaly Detection and Visualization in Generative RBAC models  14
Anomaly Detection and Visualization in Generative RBAC Model...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Leitner, Maria Rinderle, Stefanie Univ Vienna Fac Comp Sci Vienna Austria SBA Res Vienna Austria
With the wide use of Role-based access control (RBAC), the need for monitoring, evaluation, and verification of RBAC implementations (e.g., to evaluate ex post which users acting in which roles were authorized to exec... 详细信息
来源: 评论
Policy models to Protect Resource Retrieval  14
Policy Models to Protect Resource Retrieval
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Vijayakumar, Hayawardh Ge, Xinyang Jaeger, Trent Penn State Univ Dept Comp Sci & Engn Syst & Internet Infrastruct Secur Lab University Pk PA 16802 USA
Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabi... 详细信息
来源: 评论
An access control Concept for Novel Automotive HMI Systems  14
An Access Control Concept for Novel Automotive HMI Systems
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Gansel, Simon Schnitzer, Stephan Gilbeau-Hammoud, Ahmad Friesen, Viktor Duerr, Frank Rothermel, Kurt Maihoefer, Christian Daimler AG Syst Architecture & Platforms Dept Mercedes Benz Cars Div Sindelfingen Germany Univ Stuttgart Inst Parallel & Distributed Syst Stuttgart Germany
the relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer ... 详细信息
来源: 评论