咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是1-10 订阅
排序:
SacmAT 2024 - Proceedings of the 29th acm symposium on access control models and technologies
SACMAT 2024 - Proceedings of the 29th ACM Symposium on Acces...
收藏 引用
29th acm symposium on access control models and technologies, SacmAT 2024
the proceedings contain 20 papers. the topics discussed include: ToneCheck: unveiling the impact of dialects in privacy policy;make split, not hijack: preventing feature-space hijacking attacks in split learning;makin...
来源: 评论
SacmAT 2023 - Proceedings of the 28th acm symposium on access control models and technologies
SACMAT 2023 - Proceedings of the 28th ACM Symposium on Acces...
收藏 引用
28th acm symposium on access control models and technologies, SacmAT 2023
the proceedings contain 25 papers. the topics discussed include: access control vulnerabilities in network protocol implementations: how attackers exploit them and what to do about it;a framework for privacy-preservin...
来源: 评论
SacmAT 2022 - Proceedings of the 27th acm symposium on access control models and technologies
SACMAT 2022 - Proceedings of the 27th ACM Symposium on Acces...
收藏 引用
27th acm symposium on access control models and technologies, SacmAT 2022
the proceedings contain 29 papers. the topics discussed include: modular composition of access control policies: a framework to build multi-site multi-level combinations;a study of application sandbox policies in Linu...
来源: 评论
SacmAT 2021 - Proceedings of the 26th acm symposium on access control models and technologies
SACMAT 2021 - Proceedings of the 26th ACM Symposium on Acces...
收藏 引用
26th acm symposium on access control models and technologies, SacmAT 2021
the proceedings contain 19 papers. the topics discussed include: backdoor attacks to graph neural networks;analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research;towards a theory for sem...
来源: 评论
Cryptographic Enforcement of access control Policies: models, Applications, and Future Directions  29
Cryptographic Enforcement of Access Control Policies: Models...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Masucci, Barbara Univ Salerno Dept Comp Sci Fisciano Italy
Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements. Among the different techniques ... 详细信息
来源: 评论
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots  29
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Hemken, Niklas Jacob, Florian Teernava, Fabian Kartmann, Rainer Asfour, Tamim Hartenstein, Hannes Karlsruhe Inst Technol Karlsruhe Germany
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they als... 详细信息
来源: 评论
the Category-Based Approach to access control, Obligations and Privacy  23
The Category-Based Approach to Access Control, Obligations a...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Fernandez, Maribel Kings Coll London London England
the category-based access control metamodel provides an axiomatic framework for the specification of access control models. In this talk, we give an overview of the category-based approach to access control, obligatio... 详细信息
来源: 评论
A Bargaining-Game Framework for Multi-Party access control  29
A Bargaining-Game Framework for Multi-Party Access Control
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Mehri, Gelareh Hasel Monmege, Benjamin Bertolissi, Clara Zannone, Nicola Eindhoven Univ Technol Eindhoven Netherlands Aix Marseille Univ CNRS LIS Marseille France
Multi-party access control is emerging to protect shared resources in collaborative environments. Existing multi-party access control models often lack essential features to address the challenges characterizing colla... 详细信息
来源: 评论
Converting Rule-Based access control Policies: From Complemented Conditions to Deny Rules  29
Converting Rule-Based Access Control Policies: From Compleme...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Ruiz, Josue A. Narendran, Paliath Masoumzadeh, Amir Iyer, Padmavathi SUNY Albany Univ Albany Albany NY 12246 USA Drury Univ Springfield MO USA
Using access control policy rules with deny effects (i.e., negative authorization) can be preferred to using complemented conditions in the rules as they are often easier to comprehend in the context of large policies... 详细信息
来源: 评论
A Self-Sovereign Identity Approach to Decentralized access control with Transitive Delegations  29
A Self-Sovereign Identity Approach to Decentralized Access C...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Vrielynck, Pieter-Jan Van hamme, Tim Ghostin, Rawad Lagaisse, Bert Preuveneers, Davy Joosen, Wouter Katholieke Univ Leuven DistriNet B-3001 Leuven Belgium
In this paper, we introduce a new decentralized access control framework with transitive delegation capabilities that tackles the performance and scalability limitations of the existing state-of-the-art solutions. In ... 详细信息
来源: 评论