咨询与建议

限定检索结果

文献类型

  • 476 篇 会议
  • 19 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 496 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 386 篇 计算机科学与技术...
    • 175 篇 软件工程
    • 93 篇 控制科学与工程
    • 42 篇 信息与通信工程
    • 24 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
  • 44 篇 管理学
    • 31 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 36 篇 理学
    • 25 篇 数学
    • 5 篇 物理学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 2 篇 系统科学
  • 11 篇 法学
    • 10 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 158 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 15 篇 privacy
  • 13 篇 authorization
  • 10 篇 role-based acces...
  • 9 篇 xml
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 authentication
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 cloud computing
  • 6 篇 abac
  • 6 篇 throughput
  • 6 篇 semantics
  • 5 篇 traffic control
  • 5 篇 policy

机构

  • 7 篇 purdue univ w la...
  • 6 篇 eindhoven univ t...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 johns hopkins un...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...

作者

  • 18 篇 bertino elisa
  • 10 篇 li ninghui
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 487 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=10th ACM Symposium on Access Control Models and Technologies"
496 条 记 录,以下是61-70 订阅
排序:
Poster: Towards Cloud-Based Software for Incorporating Time and Location into access control Decisions  21
Poster: Towards Cloud-Based Software for Incorporating Time ...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Al Lail, Mustafa Texas A&M Int Univ Laredo TX 78041 USA
the increasing dependency on cloud computing has drawn attention to the security weaknesses of cloud providers. Not only how information is accessed, but also where and when have become important considerations in clo... 详细信息
来源: 评论
Towards a theory for Semantics and Expressiveness Analysis of Rule-Based access control models  21
Towards a Theory for Semantics and Expressiveness Analysis o...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Masoumzadeh, Amirreza Narendran, Paliath Iyer, Padmavathi Univ Albany SUNY Albany NY 12222 USA
Recent access control models such as attribute-based access control and relationship-based access control allow flexible expression of authorization policies using the concepts of rules and conditional expressions. th... 详细信息
来源: 评论
RESEARCH PROGRESS ON FAULT DIAGNOSIS OF MINING GEARBOX BASED ON CITESPACE  10
RESEARCH PROGRESS ON FAULT DIAGNOSIS OF MINING GEARBOX BASED...
收藏 引用
10th International symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Li, Zihan Jiang, Zhanglei Zha, Zhendong Li, Yunpeng Liu, Xiuli The Ministry of Education Key Laboratory of Modern Measurement and Control Technology Beijing Information Science & Technology University Beijing China Shougang Mining Corporation Xingshan Iron Mine Tangshan China
Mining gearboxes are mechanical devices used to reduce rotational speed and increase torque, widely utilized in mining and heavy industrial equipment. To further understand the research progress and development trends... 详细信息
来源: 评论
Short Paper: PSY: Posterior Sampling Based Privacy Enhancer in Large Language models  19th
Short Paper: PSY: Posterior Sampling Based Privacy Enhancer ...
收藏 引用
19th International Workshop on Data Privacy Management, DPM 2024, 8th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European symposium on Research in Computer Security, ESORICS 2024
作者: Sun, Yulian Duan, Li Li, Yong Huawei Technologies Düsseldorf Düsseldorf Germany Paderborn University Paderborn Germany Ruhr University Bochum Bochum Germany
Privacy vulnerabilities in LLMs, such as leakage from memorization, have been constantly identified, and various mitigation proposals have been proposed. LoRA is usually used in fine-tuning LLMs and a good entry point... 详细信息
来源: 评论
Towards Unifying RBAC with Information Flow control  21
Towards Unifying RBAC with Information Flow Control
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Radhika, B. S. Kumar, Narendra N., V Shyamasundar, R. K. Indian Inst Technol Bombay 400076 Maharashtra India Inst Dev & Res Banking Technol Hyderabad 500057 India
Role-based access control (RBAC) is one of the most widely implemented access control models. In today's complex computing systems, one of the increasingly sought-after features for reliable security is informatio... 详细信息
来源: 评论
In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based access control  21
In-Memory Policy Indexing for Policy Retrieval Points in Att...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Heutelbeck, Dominic Baur, Marc Lucas Kluba, Martin FTK Forschungsinst Telekommunikat & Kooperat eV Dortmund Germany
Attribute-Based access control (ABAC) systems are using machine-readable rules for making access control decisions. Rules are collected in documents, the named policies, or policy sets. these are expressed in a specif... 详细信息
来源: 评论
Utilizing Key Internet of things Concepts in Improving the Performance of Card-Based access control Systems for Vehicles in Truck-Loading Fuels Terminals  10
Utilizing Key Internet of Things Concepts in Improving the P...
收藏 引用
10th International Conference on Industrial Engineering and Applications, ICIEA 2023
作者: Bahgat, Moatz M. Farag, Hania H. Alim, Onsy Abdel Faculty of Engineering Alexandria University China
the Internet of things (IoT) is viewed as the umbrella under which heterogeneous devices are connected to form what is called the network of the future (NoF). In the IoT era, all objects and devices are instrumented, ... 详细信息
来源: 评论
Mutation Analysis of NGAC Policies  21
Mutation Analysis of NGAC Policies
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Chen, Erzhuo Dubrovenski, Vladislav Xu, Dianxiang Univ Missouri Kansas City Dept Comp Sci Elect Engn Kansas City MO 64110 USA
the NGAC (Next Generation access control) standard for attribute-based access control (ABAC) allows for run-time changes of the permission and prohibition configurations through administrative obligations triggered by... 详细信息
来源: 评论
Towards Correct Smart Contracts: A Case Study on Formal Verification of access control  21
Towards Correct Smart Contracts: A Case Study on Formal Veri...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Schiffl, Jonas Grundmann, Matthias Leinweber, Marc Stengele, Oliver Friebe, Sebastian Beckert, Bernhard Karlsruhe Inst Technol Inst Informat Secur & Dependabil KASTEL Karlsruhe Germany Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany
Ethereum is a platform for deploying smart contracts, which due to their public nature and the financial value of the assets they manage are attractive targets for attacks. With asset management as a main task of smar... 详细信息
来源: 评论
Demo: Attribute-Stream-Based access control (ASBAC) with the Streaming Attribute Policy Language (SAPL)  21
Demo: Attribute-Stream-Based Access Control (ASBAC) with the...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Heutelbeck, Dominic FTK Forschungsinst Telekommunikat & Kooperat eV Dortmund Nrw Germany
Traditional Attribute-Based access control (ABAC) implementations are based on a request-response protocol resulting in one decision for one authorization request. In stateful, session-based applications this may lead... 详细信息
来源: 评论