咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是211-220 订阅
排序:
SacmAT 2013 - Proceedings of the 18th acm symposium on access control models and technologies
SACMAT 2013 - Proceedings of the 18th ACM Symposium on Acces...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
the proceedings contain 30 papers. the topics discussed include: privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule;evolving role definitions through permission invo...
来源: 评论
Reduction of access control Decisions  14
Reduction of Access Control Decisions
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Morisset, Charles Zannone, Nicola Newcastle Univ Ctr Cybercrime & Comp Secur Newcastle Upon Tyne Tyne & Wear England Eindhoven Univ Technol Eindhoven Netherlands
access control has been proposed as"the" solution to prevent unauthorized accesses to sensitive system resources. Historically, access control models use a two-valued decision set to indicate whether an acce... 详细信息
来源: 评论
Towards Fine Grained RDF access control  14
Towards Fine Grained RDF Access Control
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Rachapalli, Jyothsna Khadilkar, Vaibhav Kantarcioglu, Murat thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
the Semantic Web is envisioned as the future of the current web, where the information is enriched with machine understandable semantics. According to the World Wide Web Consortium (W3C), "the Semantic Web provid... 详细信息
来源: 评论
Game theoretic Analysis of Multiparty access control in Online Social Networks  14
Game Theoretic Analysis of Multiparty Access Control in Onli...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Hu, Hongxin Ahn, Gail-Joon Zhao, Ziming Yang, Dejun Clemson Univ Clemson SC 29634 USA Arizona State Univ Tempe AZ 85287 USA Colorado Sch Mines Golden CO 80401 USA
Existing online social networks (OSNs) only allow a single user to restrict access to her/his data but cannot provide any mechanism to enforce privacy concerns over data associated with multiple users. this situation ... 详细信息
来源: 评论
Privacy-PAC: Privacy-enhanced physical access control  13
Privacy-PAC: Privacy-enhanced physical access control
收藏 引用
13th Workshop on Privacy in the Electronic Society, WPES 2014, in Conjunction with the acm Conference on Computer and Communications Security, acm CCS 2014
作者: Hajny, Jan Dzurenda, Petr Malina, Lukas Cryptology Research Group Brno University of Technology Brno Czech Republic
the cryptographic privacy-enhancing technologies were originally designed to improve the privacy and digital identity protection in electronic applications, such as cloud services, private Internet databases or commun... 详细信息
来源: 评论
Limiting access to Unintentionally Leaked Sensitive Documents Using Malware Signatures  14
Limiting Access to Unintentionally Leaked Sensitive Document...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Guri, Mordechai Kedma, Gabi Carmeli, Buky Elovici, Yuval Ben Gurion Univ Negev Dept Informat Syst Engn Ben Gurion Univ IL-8410501 Beer Sheva Israel Ben Gurion Univ Negev Telekom Innovat Labs Ben Gurion Univ IL-8410501 Beer Sheva Israel
Organizations are repeatedly embarrassed when their sensitive digital documents go public or fall into the hands of adversaries, often as a result of unintentional or inadvertent leakage. Such leakage has been traditi... 详细信息
来源: 评论
Demonstration Abstract: OpenSky - A Large-scale ADS-B Sensor Network for Research
Demonstration Abstract: OpenSky - A Large-scale ADS-B Sensor...
收藏 引用
13th IEEE/acm International symposium on Information Processing in Sensor Networks (IPSN)
作者: Schaefer, Matthias Strohmeier, Martin Lenders, Vincent Martinovic, Ivan Wilhelm, Matthias TU Kaiserslautern Kaiserslautern Germany Univ Oxford Oxford OX1 2JD England Armasuisse Geneva Switzerland
the future of air traffic control (ATC) will heavily depend on the Automatic Dependent Surveillance - Broadcast (ADS-B) protocol as a crucial component. ADS-B marks a paradigm change in airspace monitoring as global A... 详细信息
来源: 评论
What Are the Most Important Challenges for access control in New Computing Domains, such as Mobile, Cloud and Cyber-physical Systems?  14
What Are the Most Important Challenges for Access Control in...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Bauer, Lujo Kerschbaum, Florian Carnegie Mellon Univ Pittsburgh PA 15213 USA SAP Karlsruhe Germany
We are seeing a significant shift in the types and characteristics of computing devices that are commonly used. Today, more smartphones are sold than personal computers. An area of rapid growth are also cloud systems;... 详细信息
来源: 评论
Re-thinking Networked Privacy, Security, Identity and access control in our Surveillance States  14
Re-thinking Networked Privacy, Security, Identity and Access...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Clement, Andrew Univ Toronto Fac Informat 140 St George St Toronto ON M5S 3G6 Canada
Mass surveillance activities by the security agencies of the Five Eyes countries (e.g. NSA, CSEC, etc) pose a significant challenge to those who care about the privacy, security and other democratic rights related to ... 详细信息
来源: 评论
An information flow control meta-model  13
An information flow control meta-model
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
作者: Kafura, Dennis Gracanin, Denis Department of Computer Science Virginia Tech. Blacksburg VA United States
In this paper a meta-model for information flow control is defined using the foundation of Barker's access control meta-model. the purposes for defining this meta-model is to achieve a more principled understandin... 详细信息
来源: 评论