咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是111-120 订阅
排序:
Automated Strong Mutation Testing of XacmL Policies  20
Automated Strong Mutation Testing of XACML Policies
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Xu, Dianxiang Shrestha, Roshan Shen, Ning Univ Missouri Dept Comp Sci Elect Engn Kansas City MO USA Boise State Univ Dept Comp Sci Boise ID 83725 USA
While the existing methods for testing XacmL policies have varying levels of effectiveness, none of them can reveal the majority of policy faults. the undisclosed faults may lead to unauthorized access and denial of s... 详细信息
来源: 评论
Posture control of a Four-Wheel-Legged Robot With a Suspension System
收藏 引用
IEEE access 2020年 8卷 152790-152804页
作者: Ni, Liwei Ma, Fangwu Wu, Liang Jilin Univ State Key Lab Automot Simulat & Control Changchun 130012 South Korea Jilin Univ Coll Automot Engn Changchun 130012 Peoples R China
To achieve posture control and ride comfort (vibration isolation performance) of a robot in unstructured terrain, a novel four-wheel-legged robot (FWLR) with an actively-passively suspension system is first designed. ... 详细信息
来源: 评论
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies  20
Proactive Risk Assessment for Preventing Attribute-Forgery A...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Rubio-Medrano, Carlos E. Claramunt, Luis Jogani, Shaishavkumar Ahn, Gail-Joon Arizona State Univ Tempe AZ 85287 USA
Recently, the use of well-defined, security-relevant pieces of run-time information, a.k.a., attributes, has emerged as a convenient paradigm for writing, enforcing, and maintaining authorization policies, allowing fo... 详细信息
来源: 评论
13th International Joint Conference on Biomedical Engineering Systems and technologies, BIOSTEC 2020
13th International Joint Conference on Biomedical Engineerin...
收藏 引用
13th International Joint Conference on Biomedical Engineering Systems and technologies, BIOSTEC 2020
the proceedings contain 29 papers. the special focus in this conference is on Biomedical Engineering Systems and technologies. the topics include: Classification of Biochemical Pathway Robustness with Neural Networks ...
来源: 评论
Securing Content in Decentralized Online Social Networks:Solutions, Limitations, and the Road Ahead  22
Securing Content in Decentralized Online Social Networks&#58...
收藏 引用
Proceedings of the 27th acm on symposium on access control models and technologies
作者: Roberto Di Pietro Hamad Bin Khalifa University Doha Qatar
the most popular On-line Social Networks (OSNs) are based on centralized architectures where service providers (e.g., Facebook, Twitter, or Instagram) have full control over the data published by their user---a requir... 详细信息
来源: 评论
Poster: Unified access control for Surgical Robotics  19
Poster: Unified Access Control for Surgical Robotics
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Shah, Ryan Nagaraja, Shishir Univ Strathclyde Glasgow Lanark Scotland
来源: 评论
Mutual Authorizations: Semantics and Integration Issues  19
Mutual Authorizations: Semantics and Integration Issues
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Suntaxi, Gabriela El Ghazi, Aboubakr Achraf Boehm, Klemens Karlsruhe Inst Technol Karlsruhe Germany
Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing access control models however captures this reciprocity phenomenon. In t... 详细信息
来源: 评论
Generalized Mining of Relationship-Based access control Policies in Evolving Systems  19
Generalized Mining of Relationship-Based Access Control Poli...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Relationship-based access control (ReBAC) provides a flexible approach to specify policies based on relationships between system entities, which makes them a natural fit for many modern information systems, beyond onl... 详细信息
来源: 评论
An OpenRBAC Semantic Model for access control in Vehicular Networks  19
An OpenRBAC Semantic Model for Access Control in Vehicular N...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Alsarra, Sultan Yen, I-Ling Huang, Yongtao Bastani, Farokh thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
Inter-vehicle communication has the potential to significantly improve driving safety, but also raises security concerns. the fundamental mechanism to govern information sharing behaviors is access control. Since vehi... 详细信息
来源: 评论
CMCAP: Ephemeral Sandboxes for Adaptive access control  19
CMCAP: Ephemeral Sandboxes for Adaptive Access Control
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Bucuti, theogene Hakiza Dantu, Ram Morozov, Kirill Univ North Texas Dept Comp Sci & Engn Denton TX 76203 USA
We present CMCAP (context-mapped capabilities), a decentralized mechanism for specifying and enforcing adaptive access control policies for resource-centric security. Policies in CMCAP express runtime constraints defi... 详细信息
来源: 评论