咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 405 篇 工学
    • 372 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 81 篇 控制科学与工程
    • 59 篇 信息与通信工程
    • 38 篇 电气工程
    • 10 篇 安全科学与工程
    • 6 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 动力工程及工程热...
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 3 篇 城乡规划学
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 40 篇 管理学
    • 27 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 30 篇 理学
    • 21 篇 数学
    • 7 篇 统计学(可授理学、...
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 法学
    • 8 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 156 篇 access control
  • 26 篇 security
  • 17 篇 rbac
  • 14 篇 authorization
  • 12 篇 privacy
  • 9 篇 role-based acces...
  • 8 篇 internet of thin...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 attribute-based ...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 analytical model...
  • 6 篇 xml
  • 5 篇 abac
  • 5 篇 traffic control
  • 5 篇 authentication
  • 5 篇 access control m...
  • 5 篇 design
  • 5 篇 semantics

机构

  • 8 篇 purdue univ w la...
  • 6 篇 purdue univ dept...
  • 5 篇 carnegie mellon ...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 3 篇 colorado state u...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 3 篇 tennessee techno...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 beihang univ eco...
  • 2 篇 univ. of texas d...

作者

  • 19 篇 bertino elisa
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 10 篇 sandhu ravi
  • 9 篇 li ninghui
  • 9 篇 ahn gail-joon
  • 8 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 stoller scott d.
  • 6 篇 carminati barbar...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...
  • 5 篇 kerschbaum flori...

语言

  • 473 篇 英文
  • 8 篇 其他
  • 1 篇 西班牙文
  • 1 篇 中文
检索条件"任意字段=13th ACM Symposium on Access Control Models and Technologies"
483 条 记 录,以下是81-90 订阅
排序:
SCIFFS: Enabling Secure third-Party Security Analytics using Serverless Computing  21
SCIFFS: Enabling Secure Third-Party Security Analytics using...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Polinsky, Isaac Datta, Pubali Bates, Adam Enck, William N Carolina State Univ Raleigh NC 27695 USA Univ Illinois Champaign IL USA
third-party security analytics allow companies to outsource threat monitoring tasks to teams of experts and avoid the costs of in-house security operations centers. By analyzing telemetry data from many clients these ... 详细信息
来源: 评论
Application Research of Vertical Federated Learning Technology in Banking Risk control Model Strategy  21
Application Research of Vertical Federated Learning Technolo...
收藏 引用
21st IEEE International symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Luo, Yong Lu, Zhi Yin, Xiaofei Lu, Songfeng Weng, Yiting Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China China Minsheng Banking Corp. Ltd. Beijing China Shenzhen Huazhong University of Science and Technology Research Institute Wuhan China Shu Lun Pan Beijing China
this study centers on the application of vertical federated learning technology in the context of Internet banking loans, with a particular focus on innovations in data privacy protection, risk control model algorithm... 详细信息
来源: 评论
Data-based Sequential Design of 2x2 Multi-loop PID controllers  13th
Data-based Sequential Design of 2x2 Multi-loop PID Controlle...
收藏 引用
13th IFAC symposium on Dynamics and control of Process Systems, including Biosystems (DYCOPS)
作者: Zhang, Yinan Kumar, Anikesh Yang, Xin Samavedham, Lakshminarayanan Chiu, Min-Sen Natl Univ Singapore Dept Chem & Biomol Engn Singapore 117585 Singapore Chongqing Univ Technol Sch Chem & Chem Engn Chongqing 400054 Peoples R China
this paper introduces a sequential design method for multi-loop PID controllers under the Virtual Reference Feedback Tuning (VRFT) methodology. Simulation studies are presented to illustrate the effect of different re... 详细信息
来源: 评论
Numerical Analysis of Electric Field Interactions Associated with DNA Hybridization in A Microfluidic Device
Numerical Analysis of Electric Field Interactions Associated...
收藏 引用
International symposium on Advanced Topics in Electrical Engineering (ATEE)
作者: Sorina Gogoneață Yelda Veli Alexandru M. Morega Doctoral School of Electrical Engineering University Politehnica of Bucharest Romania Faculty of Electrical Engineering University Politehnica of Bucharest Romania "Gh. Mihoc – C. Iacob" Institute of Statistical Mathematics and Applied Mathematics Romanian Academy
the detection technologies based on specific hybridization of nucleic acids, integrated with microfluidic platforms, represent advanced bioanalysis methods for detecting pathogens, contaminants, or various biomolecule... 详细信息
来源: 评论
Isolating namespace and performance in key-value SSDs for multi-tenant environments  21
Isolating namespace and performance in key-value SSDs for mu...
收藏 引用
13th acm Workshop on Hot Topics In Storage and File Systems, HotStorage 2021
作者: Min, Donghyun Kim, Youngjae Dept. of Computer Science and Engineering Sogang University Seoul Korea Republic of
Key-value SSDs (KVSSDs) implement the storage engine of a key-value store such as log-structured merge-tree (LSM-tree) inside the SSD. However, recent LSM-tree based KVSSDs cannot be used directly in a multi-tenant en... 详细信息
来源: 评论
Teaching Estimation and control via Probabilistic Graphical models - An Intuitive and Problem-Based Approach  13
Teaching Estimation and Control via Probabilistic Graphical ...
收藏 引用
13th IFAC symposium on Advances in control Education (ACE)
作者: Hoffmann, Christian Herzog Ne Vollmer, Felix Gruner, Jonas Rostalski, Philipp Univ Lubeck Inst Elect Engn Med IME Lubeck Germany Fraunhofer Inst Individualized & Cell Based Med T Lubeck Germany
this contribution discusses an approach to teaching estimation and control via probabilistic graphical models, more specifically via Forney-style factor graphs, combined with a problem-based learning exercise model. T... 详细信息
来源: 评论
the Modern control Technology of the Linear Generator for Oceanic Wave Energy Conversion System  13
The Modern Control Technology of the Linear Generator for Oc...
收藏 引用
13th International symposium on Linear Drives for Industry Applications, LDIA 2021
作者: Farrok, Omar Kiran, Mahbubur Rahman Islam, Md. Rabiul Xu, Wei Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Tejgaon I/A Dhaka1208 Bangladesh Department of Electrical and Electronic Engineering Green University of Bangladesh Dhaka Bangladesh School of Electrical Computer and Telecommunications Engineering Faculty of Engineering and Information Sciences University of Wollongong NSW2522 Australia State Key Laboratory of Advanced Electromagnetic Engineering and Technology Huazhong University of Science and Technology Wuhan430074 China
Electrical power generation from the oceanic wave is one of the noteworthy footsteps in the field of renewable energy resource based energy conversion system. there are different technologies regarding electricity gen... 详细信息
来源: 评论
Declarative access control for Aggregations of Multiple Ownership Data  20
Declarative Access Control for Aggregations of Multiple Owne...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Rosa, Marco Di Cerbo, Francesco Lozoya, Rocio Cabrera SAP Secur Res Sophia Antipolis France Univ Bergamo Sophia Antipolis France
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal fr... 详细信息
来源: 评论
Kinematic modelling and design of a tendon actuated soft manipulator  13
Kinematic modelling and design of a tendon actuated soft man...
收藏 引用
13th IFAC symposium on Robot control (SYROCO)
作者: Banovic, Nikola Maric, Filip Seder, Marija Petrovic, Ivan Univ Zagreb Lab Autonomous Syst & Mobile Robot Fac Elect Engn & Comp Zagreb Croatia Univ Toronto Inst Aerosp Studies Space & Terr Autonomous Robot Syst Lab Toronto ON Canada
Soft robots have garnered significant attention in recent years due to their ability to perform complex and organic motions, while being simple in structure. In particular, soft manipulators have enabled safer collabo... 详细信息
来源: 评论
Deploying access control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP theorem  20
Deploying Access Control Enforcement for IoT in the Cloud-Ed...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Ahmad, Tahir Morelli, Umberto Ranise, Silvio FBK ICT Secur & Trust Unit Trento Italy Univ Genoa DIBRIS Genoa Italy
the CAP theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it... 详细信息
来源: 评论