咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是91-100 订阅
排序:
Active Learning of Relationship-Based access control Policies  20
Active Learning of Relationship-Based Access Control Policie...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Understanding access control policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced access control policy in a system is no... 详细信息
来源: 评论
thermographic Detection of Tool Wear: A Review on Deep Learning-Based Approaches
Thermographic Detection of Tool Wear: A Review on Deep Learn...
收藏 引用
International symposium on Digital Forensic and Security (ISDFS)
作者: Büşra Tan Saatçı Mustafa Ulaş Turan Gürgenç Department of Information Technologies Institute of Science Fırat University Elazig Türkiye Faculty of Engineering Artificial Intelligence and Data Engineering Fırat University Elazig Türkiye Automotive Engineering Faculty of Technologies Fırat University Elazig Türkiye
In machining processes, cutting tool wear is a critical problem affecting key performance parameters such as surface quality, production time, and cost. High temperatures cause deformation and wear in the tool materia... 详细信息
来源: 评论
Data-driven modelling of building retrofitting with incomplete physics: A generative design and machine learning approach  13
Data-driven modelling of building retrofitting with incomple...
收藏 引用
13th Nordic symposium on Building Physics, NSB 2023
作者: Yu, Haitao Feng, Kailun Penaka, Santhan Reddy Man, Qingpeng Lu, Weizhuo Olofsson, thomas Department of Construction Management Harbin Institute of Technology Harbin150009 China Department of Applied Physics and Electronics Umea University Umea90187 Sweden Key Lab of Structures Dynamic Behavior and Control The Ministry of Education Harbin Institute of Technology Harbin150009 China
Building performance simulation (BPS) based on physical models is a popular method for estimating the expected energy savings from energy-efficient building retrofitting. However, for many buildings, especially older ... 详细信息
来源: 评论
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based access control Model of Android  20
Accept - Maybe - Decline: Introducing Partial Consent for th...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Momen, Nurul Bock, Sven Fritsch, Lothar Karlstad Univ Karlstad Sweden Tech Univ Berlin Berlin Germany
the consent to personal data sharing is an integral part of modern access control models on smart devices. this paper examines the possibility of registering conditional consent which could potentially increase trust ... 详细信息
来源: 评论
Abstraction in teaching ways of control engineering to support the understanding of mathematics behind Industry 4.0-a Hungarian approach  13
Abstraction in teaching ways of control engineering to suppo...
收藏 引用
13th IFAC symposium on Advances in control Education (ACE)
作者: Tar, Jozsef Varga, Bence Galambos, Peter Szucs, Laszlo Siket, Mate Varga, Arpad Eigner, Gyorgy Kovacs, Levente Obuda Univ Physiol Controls Res Ctr Becsi St 96-B H-1034 Budapest Hungary Obuda Univ Bejczy Antal Ctr Intelligent Robot Becsi St 96-B H-1034 Budapest Hungary Obuda Univ John von Neumann Fac Informat Biomat & Appl Artificial Intelligence Inst Becsi St 96-B H-1034 Budapest Hungary Obuda Univ Appl Informat & Appl Math Doctoral Sch Becsi St 96-B H-1034 Budapest Hungary Obuda Univ Kalman Kando Fac Elect Engn Tavaszmezo St 15-17 H-1084 Budapest Hungary
Modern technologies, as well as the technologies that will emerge in the near future, pose a great challenge to researchers and educators in education and educational methodology. Teaching the intuitive use of mathema... 详细信息
来源: 评论
A Decision Tree Learning Approach for Mining Relationship-Based access control Policies  20
A Decision Tree Learning Approach for Mining Relationship-Ba...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Bui, thang Stoller, Scott D. SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing, by allowing policies to be expressed in terms of chains of relationship... 详细信息
来源: 评论
AQUA: An Efficient Solver for the User Authorization Query Problem  20
AQUA: An Efficient Solver for the User Authorization Query P...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Armando, Alessandro Gazzarata, Giorgia A. Turkmen, Fatih Univ Genoa DIBRIS Genoa Italy Univ Groningen Groningen Netherlands
We present AQUA, a solver for the User Authorization Query (UAQ) problem in Role-Based access control (RBAC). the UAQ problem amounts to determining a set of roles granting a given set of permissions, satisfying a col... 详细信息
来源: 评论
Advanced DDoS Detection in Online Learning Environments
Advanced DDoS Detection in Online Learning Environments
收藏 引用
International symposium on Digital Forensic and Security (ISDFS)
作者: Amine Berqia Oussama Ismaili Manar Chahbi Habiba Bouijij SSLab ENSIAS Mohammed V University in Rabat Rabat Morocco
the growing dependence on online learning platforms has exposed educational institutions to an increasing number of cyber threats, particularly Distributed Denial of Service (DDoS) attacks. these attacks are designed ... 详细信息
来源: 评论
Matrix Decomposition: Analysis of an access control Approach on Transaction-based DAGs without Finality  20
Matrix Decomposition: Analysis of an Access Control Approach...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Jacob, Florian Becker, Luca Grashoefer, Jan Hartenstein, Hannes Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany
the Matrix message-oriented middleware(1) is gaining momentum as a basis for a decentralized, secure messaging system as shown, for example, by its deployment within the French government and by the Mozilla foundation... 详细信息
来源: 评论
Multi-party access control-10 Years of Successes and Lessons Learned  20
Multi-party Access Control-10 Years of Successes and Lessons...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Squicciarini, Anna Cinzia Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA
As end-users have been asked to take on management tasks for their content and online resources, access control mechanisms have played an increasingly important role in a broad range of applications. these include dat... 详细信息
来源: 评论