咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是51-60 订阅
排序:
Contemporaneous Update and Enforcement of ABAC Policies  22
Contemporaneous Update and Enforcement of ABAC Policies
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Talegaon, Samir Batra, Gunjan Atluri, Vijayalakshmi Sural, Shamik Vaidya, Jaideep Rutgers State Univ Newark NJ 07102 USA Kennesaw State Univ Kennesaw GA 30144 USA IIT Kharagpur Kharagpur W Bengal India
access control policies are dynamic in nature, and therefore require frequent updates to synchronize with the latest organizational security requirements. As these updates are handled, it is important that all user ac... 详细信息
来源: 评论
BlueSky: Activity control: A Vision for "Active" Security models for Smart Collaborative Systems  22
BlueSky: Activity Control: A Vision for "Active" Security Mo...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Mawla, Tanjila Gupta, Maanak Sandhu, Ravi Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Univ Texas San Antonio Inst Cyber Secur ICS San Antonio TX USA Univ Texas San Antonio NSF C SPECC Ctr San Antonio TX USA
Cyber physical ecosystem connects different intelligent devices over heterogeneous networks. Various operations are performed on smart objects to ensure efficiency and to support automation in smart environments. An A... 详细信息
来源: 评论
WebSheets: A New Privacy-Centric Framework for Web Applications  23
WebSheets: A New Privacy-Centric Framework for Web Applicati...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Stoller, Scott D. SUNY Stony Brook Stony Brook NY 11794 USA
Spreadsheets are enormously popular because they enable non-programmers to create applications that manipulate tabular data. the core functionality of many web applications is to display and manipulate tabular data, t... 详细信息
来源: 评论
SMART and DIGITAL HEALthCARE. ADVANCED technologies and SECURITY ISSUES  24
SMART and DIGITAL HEALTHCARE. ADVANCED TECHNOLOGIES and SECU...
收藏 引用
10th Central and Eastern European e|Dem and e|Gov Days, CEEE|Gov Days 2024
作者: Alexei, Arina Platon, Nicolae Bolun, Ion Alexei, Anatolie Technical University of Moldova 168 Stefan cel Mare Bd. ChisinauMD-2004 Moldova Academy of Economic Studies of Moldova 61 Banulescu-Bodoni str. ChişinãuMD-2005 Moldova
Smart and Digital healthcare is governed by ICT (Information and Communication Technology) and uses interconnected devices through communication networks to manage medical data, monitor patient status, manage hospital... 详细信息
来源: 评论
Game with Breathing control System for Learning Circular Breathing  23
Game with Breathing Control System for Learning Circular Bre...
收藏 引用
10th acm SIGCHI Annual symposium on Computer-Human Interaction in Play, CHI PLAY 2023
作者: Takano, Shiina Niijima, Arinobu Ntt Human Informatics Laboratories Ntt Corporation Kanagawa Yokosuka Japan
We demonstrate a game with a breathing control system designed to teach circular breathing, an advanced technique used by wind instrument players. Circular breathing allows players to produce continuous sound beyond t... 详细信息
来源: 评论
BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems  22
BlueSky: Towards Convergence of Zero Trust Principles and Sc...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Ameer, Safwa Gupta, Maanak Bhatt, Smriti Sandhu, Ravi Univ Texas San Antonio Inst Cyber Secur San Antonio TX 78249 USA Univ Texas San Antonio NSF C SPECC Ctr Dept Comp Sci San Antonio TX 78249 USA Tennessee Technol Univ Cookeville TN 38505 USA Purdue Univ W Lafayette IN 47907 USA
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. It assumes no implicit trust is granted to ... 详细信息
来源: 评论
Cutting-edge technologies for Water Resource Management in e-Agriculture solutions  24
Cutting-edge technologies for Water Resource Management in e...
收藏 引用
10th Central and Eastern European e|Dem and e|Gov Days, CEEE|Gov Days 2024
作者: Pahontu, Bogdan Ionut Arsene, Diana Andreea Predescu, Alexandru National School of Political and Administrative Studies SNSPA Bucharest Romania National University of Science and Technology Politehnica Bucharest UNSTPB Bucharest Romania
the agricultural sector plays a vital role in a country's economy, contributing significantly to the national GDP. With advancements in technology and the advent of the Internet, farmers now have access to a lot o... 详细信息
来源: 评论
Cloud Security Frameworks A Comparison to Evaluate Cloud control Standards  16
Cloud Security Frameworks A Comparison to Evaluate Cloud Con...
收藏 引用
16th IEEE/acm International Conference on Utility and Cloud Computing (UCC) / 10th IEEE/acm International Conference on Big Data Computing, Applications and technologies (BDCAT)
作者: Hegde, Taarika Gangl, Josh Babenko, Stanislav Coffman, Joel Johns Hopkins Univ Baltimore MD 21218 USA US Air Force Acad Dept Comp & Cyber Sci Colorado Springs CO 80840 USA
the expansion of cloud computing applications and services has introduced a number of control and audit frameworks designed to provide a standard around data access, cloud security, and digital enablement. While certi... 详细信息
来源: 评论
Proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
24th acm symposium on access control models and technologies, SacmAT 2019
the proceedings contain 27 papers. the topics discussed include: access control for binary integrity protection using ethereum;FriendGuard: a friend search engine with guaranteed friend exposure degree;brokering polic...
来源: 评论
COLMADE: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption  22
COLMADE: Collaborative Masking in Auditable Decryption for B...
收藏 引用
10th acm Workshop on Information Hiding and Multimedia Security (IH-MMSec)
作者: Ibarrondo, Alberto Chabanne, Herve Despiegel, Vincent Onen, Melek IDEMIA Sophia Antipolis France EURECOM Sophia Antipolis France IDEMIA Paris France Telecom Paris Paris France
this paper proposes a novel collaborative decryption protocol for the Brakerski-Fan-Vercauteren (BFV) homomorphic encryption scheme in a multiparty distributed setting, and puts it to use in designing a leakage-resili... 详细信息
来源: 评论