咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是161-170 订阅
排序:
Proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
the proceedings contain 24 papers. the topics discussed include: Mohawk+T: efficient analysis of administrative temporal role-based access control (ATRBAC) policies;automated inference of access control policies for w...
来源: 评论
NFV-based QoS provision for Software Defined Optical access and residential networks
NFV-based QoS provision for Software Defined Optical Access ...
收藏 引用
International Workshop on Quality of Service
作者: Ricardo Flores Moyano David Fernández Luis Bellido Noemí Merayo Juan Carlos Aguado Ignacio de Miguel Departamento de Ingenieria de Sistemas Telematicos Universidad Politecnica de Madrid Spain Grupo de Comunicaciones Opticas Universidad de Valladolid Spain
the promises of SDN and NFV technologies to boost innovation and to reduce the time-to-market of new services is changing the way in which residential networks will be deployed, managed and maintained in the near futu... 详细信息
来源: 评论
An Architecture for Spectrum Management and Coordinated control in 5G Heterogeneous Networks  13
An Architecture for Spectrum Management and Coordinated Cont...
收藏 引用
13th International symposium on Wireless Communication Systems (ISWCS)
作者: Kliks, Adrian Bossy, Bartosz Khan, Shah Nawaz Riggio, Roberto Goratti, Leonardo Poznan Univ Tech Chair Radio Commun Fac Elect & Telecommun Poznan Poland CREATE NET Via Alla Cascata 56-D I-38123 Trento Italy
Achieving the Key Performance Indicators defined for 5G networks will require the implementation of new technologies and the deployment of dense heterogeneous networks, using different Radio access technologies and se... 详细信息
来源: 评论
Earp: Principled Storage, Sharing, and Protection for Mobile Apps  13
Earp: Principled Storage, Sharing, and Protection for Mobile...
收藏 引用
13th USENIX symposium on Networked Systems Design and Implementation (NSDI)
作者: Xu, Yuanzhong Hunt, Tyler Kwon, Youngjin Georgiev, Martin Shmatikovt, Vitaly Witchel, Emmett Univ Texas Austin Austin TX 78712 USA Cornell Tech New York NY USA
Modern mobile apps need to store and share structured data, but the coarse-grained access-control mechanisms in existing mobile operating systems are inadequate to help apps express and enforce their protection requir... 详细信息
来源: 评论
On the Temporal access control Implementation at the Logical Level of Relational Databases  11
On the Temporal Access Control Implementation at the Logical...
收藏 引用
13th International Scientific and Technical Conference Computer Sciences and Information technologies (CSIT)
作者: Zhezhnych, Pavlo Burak, Teodor Chyrka, Oleg Lviv Polytech Natl Univ Dept Social Commun & Informat Act Lvov Ukraine Lviv Polytech Natl Univ Informat Ctr Lvov Ukraine
Any information system built on a database can not function without data access control component. Role-Based access control (RBAC) models are the most acceptable for large database operating. there are several approa... 详细信息
来源: 评论
Resiliency policies in access control revisited  16
Resiliency policies in access control revisited
收藏 引用
21st acm symposium on access control models and technologies, SacmAT 2016
作者: Crampton, Jason Gutin, Gregory Watrigant, Rémi Royal Holloway University of London EghamTW20 9QY United Kingdom
Resiliency is a relatively new topic in the context of access control. Informally, it refers to the extent to which a multi-user computer system, subject to an authorization policy, is able to continue functioning if ... 详细信息
来源: 评论
Sieve: Cryptographically Enforced access control for User Data in Untrusted Clouds  13
Sieve: Cryptographically Enforced Access Control for User Da...
收藏 引用
13th USENIX symposium on Networked Systems Design and Implementation (NSDI)
作者: Wang, Frank Mickens, James Zeldovich, Nickolai Vaikuntanathan, Vinod MIT CSAIL Cambridge MA 02139 USA Harvard Univ Cambridge MA 02138 USA
Modern web services rob users of low-level control over cloud storage-a user's single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. the conse... 详细信息
来源: 评论
Towards access control for Isolated Applications  13
Towards Access Control for Isolated Applications
收藏 引用
13th International Joint Conference on e-Business and Telecommunications (ICETE)
作者: Belyaev, Kirill Ray, Indrakshi Colorado State Univ Dept Comp Sci Ft Collins CO 80523 USA
With the advancements in contemporary multi-core CPU architectures, it is now possible for a server operating system (OS), such as Linux, to handle a large number of concurrent application services on a single server ... 详细信息
来源: 评论
Performance Improvement in WLAN and LTE Based on Backlog control Middleware  2016
Performance Improvement in WLAN and LTE Based on Backlog Con...
收藏 引用
13th Annual International Conference on Mobile and Ubiquitous Systems - Computing, Networking and Services (MobiQuitous)
作者: Shimada, Ayumi Oguchi, Masato Yamaguchi, Saneyasu Kaartinen, Heidi Heikkila, Marjo Jamsa, Joni Ochanomizu Univ Dept Informat Sci Tokyo Japan Kogakuin Univ Tokyo Japan Centria Univ Appl Sci Centria Res & Dev Ylivieska Finland
Smartphones have highly functional operating systems similar to PCs. their communication throughput depends on behavior of Transmission control Protocol (TCP). Modern loss-based TCP algorithms take aggressive congesti... 详细信息
来源: 评论
the Entity Labeling Pattern for Modeling Operating Systems access control  1
收藏 引用
12th International Joint Conference on E-Business and Telecommunications (ICETE)
作者: Amthor, Peter Ilmenau Univ Technol POB 100565 D-98684 Ilmenau Germany
To meet tightening security requirements, modern operating systems enforce mandatory access control based on formal security policies. To ensure the critical property of policy correctness, formal methods and models f... 详细信息
来源: 评论