咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是171-180 订阅
排序:
13th European Conference on Multi-Agent Systems, EUMAS 2015 and 3rd International Conference on Agreement technologies, AT 2015
13th European Conference on Multi-Agent Systems, EUMAS 2015 ...
收藏 引用
13th European Conference on Multi-Agent Systems, EUMAS 2015 and 3rd International Conference on Agreement technologies, AT 2015
the proceedings contain 37 papers. the special focus in this conference is on Coordination and Planning. the topics include: Reducing risk in norm-based systems;from public plans to global solutions in multiagent plan...
来源: 评论
Investigation on the Gate Electrode Configuration of IGZO TFTs for Improved Channel control and Suppression of Bias-Stress Induced Instability  230
Investigation on the Gate Electrode Configuration of IGZO TF...
收藏 引用
13th symposium on thin Film Transistor technologies (TFT)
作者: Mudgal, T. Edwards, N. Ganesh, P. Bharadwaj, A. Powell, Eli Pierce, M. S. Manley, R. G. Hirschman, K. D. Rochester Inst Technol Elect & Microelect Engn Dept Rochester NY 14623 USA Rochester Inst Technol Sch Phys & Astron Rochester NY 14623 USA Corning Inc Sci & Technol Corning NY 14870 USA
this work presents an investigation on TFTs which have been fabricated with very similar process flows with the exception of the placement of the gate electrode. Bottom-gate TFTs with back-channel passivation that dem... 详细信息
来源: 评论
SacmAT 2014 - Proceedings of the 19th acm symposium on access control models and technologies
SACMAT 2014 - Proceedings of the 19th ACM Symposium on Acces...
收藏 引用
19th acm symposium on access control models and technologies, SacmAT 2014
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based access control;an access control concept for novel automotive HMI systems;monitor placem...
来源: 评论
Privacy and access control;How are these twoconcepts related?  15
Privacy and access control;How are these twoconcepts related...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Squicciarini, Anna Yu, Ting College of Information Sciences and Technology Pennsylvania State University United States Qatar Computing Research Institute Doha Qatar
No abstract available.
来源: 评论
Hard instances for verification problems in access control  15
Hard instances for verification problems in access control
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Mousavi, Nima Tripunitara, Mahesh Google Inc. Waterloo Canada ECE University of Waterloo Waterloo Canada
We address the generation and analysis of hard instances for verification problems in access control that are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu... 详细信息
来源: 评论
MobiWac 2015 - Proceedings of the 13th acm International symposium on Mobility Management and Wireless access
MobiWac 2015 - Proceedings of the 13th ACM International Sym...
收藏 引用
13th acm International symposium on Mobility Management and Wireless access, MobiWac 2015
the proceedings contain 13 papers. the topics discussed include: methodology to events identification in vehicles using statistical process control on steering wheel data;asymmetry analysis of inbound/outbound car tra...
来源: 评论
Methodology to events identification in vehicles using statistical process control on steering wheel data  13
Methodology to events identification in vehicles using stati...
收藏 引用
13th acm International symposium on Mobility Management and Wireless access, MobiWac 2015
作者: Assuncao, Arthur N. De Paula, Fabio O. Oliveira, Ricardo A.R. IMobilis DECOM/UFOP Ouro PretoMG Brazil
Driving a vehicle has become a challenging task, especially because up to 90% of accidents involving vehicles are caused by drivers' errors. In this paper, we propose a method for events identification with the us... 详细信息
来源: 评论
A logical approach to restricting access in online social networks  15
A logical approach to restricting access in online social ne...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Cramer, Marcos Pang, Jun Zhang, Yang University of Luxembourg Luxembourg
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de... 详细信息
来源: 评论
Commune: Shared ownership in an agnostic cloud  15
Commune: Shared ownership in an agnostic cloud
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Soriente, Claudio Karame, Ghassan O. Ritzdorf, Hubert Marinovic, Srdjan Capkun, Srdjan ETH Zurich Switzerland NEC Laboratories Germany Wireless Registry Inc. United States
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes access control decisions. Existing cloud... 详细信息
来源: 评论
Intention sharing for medium access control in wireless LANs  13
Intention sharing for medium access control in wireless LANs
收藏 引用
13th acm International symposium on Mobility Management and Wireless access, MobiWac 2015
作者: Fitzgerald, Emma Bastani, Saeed Landfeldt, Bjorn Department of Electrical and Information Technology Lund University LundSE-221 00 Sweden
In this paper we present a new class of MAC protocols for wireless LANs based on sharing of transmission intentions. We develop an example protocol implementation based on distributed, co-operative scheduling of data ... 详细信息
来源: 评论