咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是61-70 订阅
排序:
Simulation of an Energy Management Test Bench for Hybrid Storage System Extensions to a Wind Energy Plant  13
Simulation of an Energy Management Test Bench for Hybrid Sto...
收藏 引用
13th International symposium on Power Electronics for Distributed Generation Systems (PEDG)
作者: Mielach, Antonio Redmann, Florian Orlik, Bernd Raffel, Holger Univ Bremen Inst Elect Drives Power Elect & Devices Bremen Germany Univ Bremen Bremer Ctr Mechatron Bremen Germany
To combine the advantages of different storage technologies, hybrid storage systems can be used. Next to the classical technologies, like super capacitors and battery systems (mostly lithium-ion today), the production... 详细信息
来源: 评论
FTM Implementation and Ranging Performance Characterization for Indoor Localization  13
FTM Implementation and Ranging Performance Characterization ...
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Hirata, Rei Koizumi, Atsushi Oguma, Hiroshi Sakaguchi, Naotaka Sumi, Takenori Nagai, Yukimasa Nit Toyama College Department of Control Information System Enginering 1-2 Ebie-Neriya Toyama Imizu933-0239 Japan Mitsubishi Electric Corporation Information Technology R&d Center 5-1-1 Ofuna Kanagawa Kamakura247-8501 Japan
Indoor positioning technologies for IoT sensing are attracting attention. We are currently exploring standard indoor positioning methods using IEEE 802.11 / Wi-Fi. In this paper, we utilize the IEEE802.11-2016 FTM (Fi... 详细信息
来源: 评论
A Comprehensive Study on Security and Privacy of E-Health Cloud-Based System  1
收藏 引用
13th Computer Science Online Conference
作者: Ali, Sadaquat Univ Warwick WMG Cyber Secur Ctr Coventry W Midlands England
Today, a growing number of individuals and organisations are considering distributing resources in this manner, considering recent technological developments involving "the cloud". Due to the sensitive and c... 详细信息
来源: 评论
Proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
24th acm symposium on access control models and technologies, SacmAT 2019
the proceedings contain 27 papers. the topics discussed include: access control for binary integrity protection using ethereum;FriendGuard: a friend search engine with guaranteed friend exposure degree;brokering polic...
来源: 评论
Elastic Cloud Services: Scaling Snowflake's control Plane  13
Elastic Cloud Services: Scaling Snowflake's Control Plane
收藏 引用
13th Annual acm symposium on Cloud Computing (SoCC)
作者: Melissaris, themis Nabar, Kunal Radut, Rares Rehmtulla, Samir Shi, Arthur Chandrashekar, Samartha Papapanagiotou, Ioannis Snowflake Inc Bozeman MT 59715 USA Gemini Trust New York NY USA
Snowflake's "Data Cloud", provided as Software-as-a-Service (SaaS), enables data storage, processing, and analytic solutions in a performant, easy to use, and flexible manner. Although cloud service prov... 详细信息
来源: 评论
Poster: Towards Cloud-Based Software for Incorporating Time and Location into access control Decisions  21
Poster: Towards Cloud-Based Software for Incorporating Time ...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Al Lail, Mustafa Texas A&M Int Univ Laredo TX 78041 USA
the increasing dependency on cloud computing has drawn attention to the security weaknesses of cloud providers. Not only how information is accessed, but also where and when have become important considerations in clo... 详细信息
来源: 评论
Towards a theory for Semantics and Expressiveness Analysis of Rule-Based access control models  21
Towards a Theory for Semantics and Expressiveness Analysis o...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Masoumzadeh, Amirreza Narendran, Paliath Iyer, Padmavathi Univ Albany SUNY Albany NY 12222 USA
Recent access control models such as attribute-based access control and relationship-based access control allow flexible expression of authorization policies using the concepts of rules and conditional expressions. th... 详细信息
来源: 评论
Towards Unifying RBAC with Information Flow control  21
Towards Unifying RBAC with Information Flow Control
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Radhika, B. S. Kumar, Narendra N., V Shyamasundar, R. K. Indian Inst Technol Bombay 400076 Maharashtra India Inst Dev & Res Banking Technol Hyderabad 500057 India
Role-based access control (RBAC) is one of the most widely implemented access control models. In today's complex computing systems, one of the increasingly sought-after features for reliable security is informatio... 详细信息
来源: 评论
In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based access control  21
In-Memory Policy Indexing for Policy Retrieval Points in Att...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Heutelbeck, Dominic Baur, Marc Lucas Kluba, Martin FTK Forschungsinst Telekommunikat & Kooperat eV Dortmund Germany
Attribute-Based access control (ABAC) systems are using machine-readable rules for making access control decisions. Rules are collected in documents, the named policies, or policy sets. these are expressed in a specif... 详细信息
来源: 评论
Mutation Analysis of NGAC Policies  21
Mutation Analysis of NGAC Policies
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Chen, Erzhuo Dubrovenski, Vladislav Xu, Dianxiang Univ Missouri Kansas City Dept Comp Sci Elect Engn Kansas City MO 64110 USA
the NGAC (Next Generation access control) standard for attribute-based access control (ABAC) allows for run-time changes of the permission and prohibition configurations through administrative obligations triggered by... 详细信息
来源: 评论