咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是101-110 订阅
排序:
A data access model for privacy-preserving cloud-iot architectures  20
A data access model for privacy-preserving cloud-iot archite...
收藏 引用
25th acm symposium on access control models and technologies, SacmAT 2020
作者: Fernández, Maribel Tapia, Alex Franch Jaimunk, Jenjira Chamorro, Manuel Martinez thuraisingham, Bhavani King's College London London United Kingdom University of Texas at Dallas Dallas United States
We propose a novel data collection and data sharing model for cloud-IoT architectures with an emphasis on data privacy. this model has been implemented in Privasee, an open source platform for privacy-aware web-applic... 详细信息
来源: 评论
Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare in Organizations  20
Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfar...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Bhatt, Paras Bhatt, Smriti Ko, Myung Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA Univ Texas San Antonio Dept Comp & Cyber Secur San Antonio TX USA
Recently, Internet of things (IoT) devices and applications are becoming increasingly popular among users in various IoT domains, such as Wearable IoT, Smart Cities, Smart Home, and Smart Industry. With a range of IoT... 详细信息
来源: 评论
Benchmarking UAQ Solvers  20
Benchmarking UAQ Solvers
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Armando, Alessandro Gazzarata, Giorgia Turkmen, Fatih Univ Genoa DIBRIS Genoa Italy Univ Groningen Groningen Netherlands
the User Authorization Query (UAQ) Problem is key for RBAC systems that aim to offer permission level user-system interaction, where the system automatically determines the roles to activate in order to enable the req... 详细信息
来源: 评论
Norm-based access control  20
Norm-based Access Control
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Ulusoy, Onuralp Yolum, Pinar Univ Utrecht Utrecht Netherlands
Collaborative systems, such as online social networks or Internet of things, host vast amounts of content that is created and manipulated by multiple users. Co-edited documents or group pictures are prime examples of ... 详细信息
来源: 评论
Interference Avoidance Based Multiplex Channel Scheme in High-density C-V2X  13
Interference Avoidance Based Multiplex Channel Scheme in Hig...
收藏 引用
13th International Conference on Wireless Communications and Signal Processing, WCSP 2021
作者: Wang, Jiao Zhang, Shibing Qiu, Gongan Bao, Zhihua Nantong University School of Information Science and Technology Nantong China Nantong University School of Information Science and Technology Nantong Research Institute for Advanced Communication Technologies Nantong China
For disseminating safety warning messages, the terminal on board needs to multiplex the cellular channel to establish the temporary links in high-density C-V2X. then, the potential co-channel interference will degrade... 详细信息
来源: 评论
FTM Implementation and Ranging Performance Characterization for Indoor Localization
FTM Implementation and Ranging Performance Characterization ...
收藏 引用
IEEE Global Conference on Consumer Electronics (GCCE)
作者: Rei Hirata Atsushi Koizumi Hiroshi Oguma Naotaka Sakaguchi Takenori Sumi Yukimasa Nagai Department of Control Information System Enginering NIT Toyama College Toyama Japan Information Technology R&D Center Mitsubishi Electric Corporation Kanagawa Japan
Indoor positioning technologies for IoT sensing are attracting attention. We are currently exploring standard indoor positioning methods using IEEE 802.11 / Wi-Fi. In this paper, we utilize the IEEE802.11-2016 FTM (Fi... 详细信息
来源: 评论
Emotion-Driven Intelligent Product Design Based on Deep Learning
Emotion-Driven Intelligent Product Design Based on Deep Lear...
收藏 引用
International Conference on Communication Systems and Network technologies (CSNT)
作者: Mengmeng Zhang Polus International College Chengdu China
this research investigates the integrated application of deep learning technologies in the field of emotion-driven interior soft decoration product design. through comprehensive online surveys conducted with over 1000... 详细信息
来源: 评论
ABAC-CC: Attribute-Based access control and Communication control for Internet of things  20
ABAC-CC: Attribute-Based Access Control and Communication Co...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Bhatt, Smriti Sandhu, Ravi Texas A&M Univ Dept Comp & Cyber Secur San Antonio TX 78224 USA Texas A&M Univ Inst Cyber Secur San Antonio TX USA Texas A&M Univ CREST C SPECC Dept Comp Sci San Antonio TX USA
Internet of things (IoT) is revolutionizing the capabilities of the Internet with billions of connected devices in the cyberspace. these devices are commonly referred to as smart things enabling smart environments, su... 详细信息
来源: 评论
Session details: Session 2: access control models  21
Session details: Session 2: Access Control Models
收藏 引用
Proceedings of the 26th acm symposium on access control models and technologies
作者: Eleonora Losiouk University of Padova
No abstract available.
来源: 评论
Analysis of access control Enforcement in Android  20
Analysis of Access Control Enforcement in Android
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Enck, William North Carolina State Univ Raleigh NC 27695 USA
Over the past decade, the Android operating system install-base has proliferated to billions of devices, rivaling Microsoft Windows as a top computing platform. One of the most attractive aspects of Android is its vas... 详细信息
来源: 评论