咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是191-200 订阅
排序:
Fine-grained business data confidentiality control in cross-organizational tracking  15
Fine-grained business data confidentiality control in cross-...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Han, Weili Zhang, Yin Guo, Zeqing Bertino, Elisa Software School Fudan University Shanghai Key Laboratory of Data Science Shanghai201203 China Department of Computer Science Purdue University West LafayetteIN47907 United States
With the support of the Internet of things (IoT for short) technologies, tracking systems are being widely deployed in many companies and organizations in order to provide more efficient and trustworthy delivery servi... 详细信息
来源: 评论
Dynamic Game access control based on Trust  14
Dynamic Game Access Control based on Trust
收藏 引用
Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE)
作者: Ma, Shunan Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China
access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, ... 详细信息
来源: 评论
Investments in smart nano-control systems in cold supply chains  13
Investments in smart nano-control systems in cold supply cha...
收藏 引用
13th International symposium on Operational Research, SOR 2015
作者: Bogataj, David Bogataj, Marija Drobne, Damjana Ros-McDonnell, Lorenzo Rudolf, Rebeka Hudoklin, Domen MEDIFAS-CERRISK Mednarodni Prehod 6 Vrtojba Šempeter pri GoriciSI-5290 Slovenia University of Ljubljana LjubljanaSI-1000 Slovenia Technical University Cartagena ETSII C/Dr. Fleming s/n Cartagena30202 Spain University of Maribor Slomškov trg 15 2000 Slovenia
Fruit and Vegetable Supply Chain Management (F&V SCM) requires more intelligent technology to improve postharvest loss prevention;however, the current technology has to be improved to reduce the lead times and per... 详细信息
来源: 评论
***: Building the Next Generation Web3D Repository with AngularJS and X3DOM  15
***: Building the Next Generation Web3D Repository with Angu...
收藏 引用
20th International acm symposium on 3D Web technologies (Web3D)
作者: Scully, Timothy Dobos, Jozef Sturm, Timo Jung, Yvonne 3D Repo Ltd London England Fraunhofer IGD Darmstadt Germany Hsch Fulda Fulda Germany
this paper presents a novel open source web-based 3D version control system positioned directly within the context of the recent strategic plan for digitising the construction sector in the United Kingdom. the aim is ... 详细信息
来源: 评论
Trust-based formal delegation framework for Enterprise Social Networks  14
Trust-based formal delegation framework for Enterprise Socia...
收藏 引用
Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE)
作者: Bouchami, Ahmed Perrin, Olivier Zahoor, Ehtesham Univ Lorraine LORIA BP 239 F-54506 Vandoeuvre Les Nancy France Natl Univ Comp & Emerging Sci FAST NU Islamabad Pakistan
Collaborative environments raise major challenges to secure them. these challenges increase when it comes to the domain of Enterprise-Social-Networks (ESNs) as ESNs aim to incorporate the social technologies in an org... 详细信息
来源: 评论
Shuffle Index: Efficient and Private access to Outsourced Data
收藏 引用
acm TRANSACTIONS ON STORAGE 2015年 第4期11卷 19-19页
作者: di Vimercati, Sabrina De Capitani Foresti, Sara Paraboschi, Stefano Pelosi, Gerardo Samarati, Pierangela Univ Milan Dipartimento Informat I-26013 Crema CR Italy Univ Bergamo Dipartimento Ingn Gest Informaz & Prod I-24044 Dalmine BG Italy Politecn Milan Dipartimento Elettron Informaz & Bioingn I-20133 Milan MI Italy
Data outsourcing and cloud computing have been emerging at an ever-growing rate as successful approaches for allowing users and companies to rely on external services for storing and managing data. As data and access ... 详细信息
来源: 评论
Dynamic Game access control based on Trust
Dynamic Game Access Control based on Trust
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications
作者: Shunan Ma State Key Lab. of Inf. Security Inst. of Inf. Eng. Beijing China
access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, ... 详细信息
来源: 评论
Attribute-Based access control models and Beyond  15
Attribute-Based Access Control Models and Beyond
收藏 引用
Proceedings of the 10th acm symposium on Information, Computer and Communications Security
作者: Ravi Sandhu University of Texas at San Antonio USA
this talk will provide a perspective on attribute-based access control (ABAC). the ongoing authorization leap from rights to attributes offers numerous compelling benefits. Decisions about user, subject, object and co... 详细信息
来源: 评论
Challenges in Making access control Sensitive to the "Right" Contexts  15
Challenges in Making Access Control Sensitive to the "Right"...
收藏 引用
Proceedings of the 20th acm symposium on access control models and technologies
作者: Trent Jaeger Pennsylvania State University University Park PA USA
access control is a fundamental security mechanism that both protects processes from attacks and confines compromised processes that may try to propagate an attack. Nonetheless, we still see an ever increasing number ... 详细信息
来源: 评论
Redaction based RDF access control Language  14
Redaction based RDF Access Control Language
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Rachapalli, Jyothsna Khadilkar, Vaibhav Kantarcioglu, Murat thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
We propose an access control language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF access control. the access control language ... 详细信息
来源: 评论