咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是71-80 订阅
排序:
Towards Correct Smart Contracts: A Case Study on Formal Verification of access control  21
Towards Correct Smart Contracts: A Case Study on Formal Veri...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Schiffl, Jonas Grundmann, Matthias Leinweber, Marc Stengele, Oliver Friebe, Sebastian Beckert, Bernhard Karlsruhe Inst Technol Inst Informat Secur & Dependabil KASTEL Karlsruhe Germany Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany
Ethereum is a platform for deploying smart contracts, which due to their public nature and the financial value of the assets they manage are attractive targets for attacks. With asset management as a main task of smar... 详细信息
来源: 评论
Demo: Attribute-Stream-Based access control (ASBAC) with the Streaming Attribute Policy Language (SAPL)  21
Demo: Attribute-Stream-Based Access Control (ASBAC) with the...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Heutelbeck, Dominic FTK Forschungsinst Telekommunikat & Kooperat eV Dortmund Nrw Germany
Traditional Attribute-Based access control (ABAC) implementations are based on a request-response protocol resulting in one decision for one authorization request. In stateful, session-based applications this may lead... 详细信息
来源: 评论
Expressive Bilateral access control for Internet-of-things in Cloud-Fog Computing  21
Expressive Bilateral Access Control for Internet-of-Things i...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Xu, Shengmin Ning, Jianting Ma, Jinhua Huang, Xinyi Pang, Hwee Hwa Deng, Robert H. Fujian Normal Univ Fuzhou Fujian Peoples R China Singapore Management Univ Singapore Singapore Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing 100093 Peoples R China
As a versatile system architecture, cloud-fog Internet-of-things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive ... 详细信息
来源: 评论
P-sharding: Streamline Emergency Medical Transactions via Priority Sharding  13th
P-sharding: Streamline Emergency Medical Transactions via Pr...
收藏 引用
13th EAI International Conference on Ad Hoc Networks (ADHOCNETS) / 16th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information technologies (TRIDENTCOM)
作者: Saini, Akanksha Kaur, Navneesh Singh, Navneet Wijaya, Dimaz Deakin Blockchain Innovat Lab Sch Informat Technol Geelong Vic Australia Catholic Univ Korea Dept Informat Commun & Elect Engn Seoul South Korea Deakin Univ Sch Informat Technol Geelong Vic Australia
In recent years, several blockchain-based access control models have been emerged to give individuals control over their sensitive Electronic Medical Records (EMRs) in the healthcare sector. From our extensive literat... 详细信息
来源: 评论
Network (In)security: Leniency in Protocols' Design, Code and Configuration  22
Network (In)security: Leniency in Protocols' Design, Code an...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Hoque, Endadul Syracuse Univ Syracuse NY 13210 USA
Protocols are one of the founding pillars of network communication. Given their importance, protocols have received great attention not only from the research community but also from adversaries. Protocols, particular... 详细信息
来源: 评论
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing  21
Can I Reach You? Do I Need To? New Semantics in Security Pol...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Katsis, Charalampos Cicala, Fabrizio thomsen, Dan Ringo, Nathan Bertino, Elisa Purdue Univ W Lafayette IN 47907 USA SIFT LLC Minneapolis MN USA
the zero trust principle only allows authorized and authenticated actions in a computer network. A network policy satisfies the least privilege principle by minimizing the network permissions to only those needed by u... 详细信息
来源: 评论
Archetype Building Energy models for Residential Sector: Importance of Uncontrolled Inputs in Predictive control and Energy Flexibility  13
Archetype Building Energy Models for Residential Sector: Imp...
收藏 引用
13th Nordic symposium on Building Physics, NSB 2023
作者: Abtahi, S.M. Athienitis, A.K. Delcroix, B. Centre for Zero Energy Building Studies Department of Building Civil and Environmental Engineering Concordia University MontrealQC Canada ShawiniganQC Canada
A 1st-order gray-box archetype is developed using high-quality measurements from an unoccupied experimental house to investigate the sensitivity of economic model-based predictive control performance under Quebec'... 详细信息
来源: 评论
Fault Identification in Mechatronic Systems  13
Fault Identification in Mechatronic Systems
收藏 引用
13th IFAC symposium on Robot control (SYROCO)
作者: Zhirabok, Alexey N. Zuev, Alexander, V Shumsky, Alexey Ye Far Eastern Fed Univ Dept Automat & Robot Vladivostok 690950 Russia Inst Marine Technol Problems Dept Intelligent Control Russia 690950 Russia Sevastopol State Univ Sevastopol 299053 Russia
the paper studies the problem of fault identification in mechatronic systems described by nonlinear models under the disturbances. To address the problem, sliding mode observers are used. the suggested approach for co... 详细信息
来源: 评论
Proactive Look-Ahead control of Transaction Flows for High-throughput Payment Channel Network  13
Proactive Look-Ahead Control of Transaction Flows for High-T...
收藏 引用
13th Annual acm symposium on Cloud Computing (SoCC)
作者: Chen, Wuhui Qiu, Xiaoyu Hong, Zicong Zheng, Zibin Dai, Hong-Ning Zhang, Jianting Sun Yat Sen Univ Guangzhou Peoples R China Hong Kong Polytech Univ Hong Kong Peoples R China Hong Kong Baptist Univ Hong Kong Peoples R China Purdue Univ W Lafayette IN 47907 USA
Blockchain technology has gained popularity owing to the success of cryptocurrencies such as Bitcoin and Ethereum. Nonetheless, the scalability challenge largely limits its applications in many real-world scenarios. O... 详细信息
来源: 评论
Towards Activity-Centric access control for Smart Collaborative Ecosystems  21
Towards Activity-Centric Access Control for Smart Collaborat...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Sandhu, Ravi Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Univ Texas San Antonio Inst Cyber Secur San Antonio TX USA Univ Texas San Antonio NSF C SPECC Ctr Dept Comp Sci San Antonio TX USA
the ubiquitous presence of smart devices along with advancements in connectivity coupled with the elastic capabilities of cloud and edge systems have nurtured and revolutionized smart ecosystems. Intelligent, integrat... 详细信息
来源: 评论