咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是261-270 订阅
排序:
DySCO: A dynamic spectrum and contention control framework for enhanced broadcast Communication in Vehicular Networks
DySCO: A dynamic spectrum and contention control framework f...
收藏 引用
10th acm International symposium on Mobility Management and Wireless access, MobiWac 2012
作者: Di Felice, Marco Bedogni, Luca Bononi, Luciano Department of Computer Science University of Bologna Italy
Recently, the IEEE 1609.4 protocol has been defined to enable multi-channel operations in a vehicular environment, and to guarantee interference-free co-existence of safety-related and non-safety related applications ... 详细信息
来源: 评论
An OWL representation of the MLO model
An OWL representation of the MLO model
收藏 引用
2012 IEEE 10th Jubilee International symposium on Intelligent Systems and Informatics, SISY 2012
作者: Segedinac, Milan Konjović, Zora Surla, Dušan Savić, Goran Faculty of Technical Sciences Department of Computing and Control Novi Sad Serbia Faculty of Sciences Department of Mathematics and Informatics Novi Sad Serbia
Learning opportunities play an important role in the vision of curriculum favored by the Bologna Process. this paper proposes an ontology intended for representing learning opportunities. the ontology is designed in a... 详细信息
来源: 评论
2012 10th International symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2012
2012 10th International Symposium on Modeling and Optimizati...
收藏 引用
2012 10th International symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, WiOpt 2012
the proceedings contain 67 papers. the topics discussed include: estimating wireless network properties with spatial statistics and models;should we use the default protocol settings for networks of constrained device...
来源: 评论
Session details: access control policies  12
Session details: Access control policies
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: James Joshi University of Pittsburgh
No abstract available.
来源: 评论
Session details: access control applications  12
Session details: Access control applications
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: Elisa Bertino Purdue University
No abstract available.
来源: 评论
Session details: access control for mobile devices and social networks  12
Session details: Access control for mobile devices and socia...
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: Ian Molloy IBM Research
No abstract available.
来源: 评论
Session details: Role-based access control  12
Session details: Role-based access control
收藏 引用
Proceedings of the 17th acm symposium on access control models and technologies
作者: Axel Kern Beta Systems Software AG
No abstract available.
来源: 评论
SacmAT'10 - Proceedings of the 15th acm symposium on access control models and technologies
SACMAT'10 - Proceedings of the 15th ACM Symposium on Access ...
收藏 引用
15th acm symposium on access control models and technologies, SacmAT 2010
the proceedings contain 19 papers. the topics discussed include: a model of triangulating environments for policy authoring;towards analyzing complex operating system access control configurations;monitoring security ...
来源: 评论
Modeling context for access control systems
Modeling context for access control systems
收藏 引用
International symposium on Intelligent Systems and Informatics (SISY)
作者: G. Sladić B. Milosavljević Z. Konjović Faculty of Technical Sciences University of Novi Sad Novi Sad Serbia
access control is one of key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this paper, we present a particular context model for... 详细信息
来源: 评论
Higher-order approximations for verification of stochastic hybrid systems
Higher-order approximations for verification of stochastic h...
收藏 引用
10th International symposium on Automated Technology for Verification and Analysis, ATVA 2012
作者: Esmaeil Zadeh Soudjani, Sadegh Abate, Alessandro Delft Center for Systems and Control TU Delft Mekelweg 2 Delft 2628 CD Netherlands
this work investigates the approximate verification of probabilistic specifications expressed as any non-nested PCTL formula over Markov processes on general state spaces. the contribution puts forward new algorithms,... 详细信息
来源: 评论