咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是1-10 订阅
排序:
SacmAT'09 - Proceedings of the 14th acm symposium on access control models and technologies
SACMAT'09 - Proceedings of the 14th ACM Symposium on Access ...
收藏 引用
14th acm symposium on access control models and technologies, SacmAT 2009
the proceedings contain 24 papers. the topics discussed include: safety in discretionary access control for logic-based publish-subscribe systems;ensuring spatio-temporal access control for real-world applications;an ...
来源: 评论
Insights On Industrial Firewall and Its Application in Networked control Systems  24
Insights On Industrial Firewall and Its Application in Netwo...
收藏 引用
14th International Conference on Communication and Network Security, ICCNS 2024
作者: Wan, Ming Shi, Taofeng Wang, Xinjun Li, Dong Zhao, Yihao School of Cyber Science and Engineering Liaoning University Liaoning Shenyang China School of Information Liaoning University Liaoning Shenyang China
Current networked control systems are facing more and more severe challenges of cyber threats, and various intrinsic network-related vulnerabilities may cause serious damage to industrial production. To strengthen the... 详细信息
来源: 评论
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
SACMAT 2005: Proceedings of 10th ACM Symposium on Access Con...
收藏 引用
SacmAT 2005: Proceedings of 10th acm symposium on access control models and technologies
the proceedings contain 19 papers. the topics discussed include: integrity constraints in trust management;declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastruc... 详细信息
来源: 评论
SacmAT 2020 - Proceedings of the 25th acm symposium on access control models and technologies
SACMAT 2020 - Proceedings of the 25th ACM Symposium on Acces...
收藏 引用
25th acm symposium on access control models and technologies, SacmAT 2020
the proceedings contain 24 papers. the topics discussed include: metering graphical data leakage with snowman;visualizing and interpreting RNN models in URL-based phishing detection;parallel space traveling: a securit...
来源: 评论
SacmAT 2014 - Proceedings of the 19th acm symposium on access control models and technologies
SACMAT 2014 - Proceedings of the 19th ACM Symposium on Acces...
收藏 引用
19th acm symposium on access control models and technologies, SacmAT 2014
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based access control;an access control concept for novel automotive HMI systems;monitor placem...
来源: 评论
SacmAT'12 - Proceedings of the 17th acm symposium on access control models and technologies
SACMAT'12 - Proceedings of the 17th ACM Symposium on Access ...
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
the proceedings contain 27 papers. the topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for access control policies: applications to role mining over logs wi...
来源: 评论
SacmAT'11 - Proceedings of the 16th acm symposium on access control models and technologies
SACMAT'11 - Proceedings of the 16th ACM Symposium on Access ...
收藏 引用
16th acm symposium on access control models and technologies, SacmAT 2011
the proceedings contain 22 papers. the topics discussed include: a decade of model-driven security;deriving role engineering artifacts from business processes and scenario models;an integrated approach for identity an...
来源: 评论
SacmAT 2021 - Proceedings of the 26th acm symposium on access control models and technologies
SACMAT 2021 - Proceedings of the 26th ACM Symposium on Acces...
收藏 引用
26th acm symposium on access control models and technologies, SacmAT 2021
the proceedings contain 19 papers. the topics discussed include: backdoor attacks to graph neural networks;analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research;towards a theory for sem...
来源: 评论
SacmAT 2013 - Proceedings of the 18th acm symposium on access control models and technologies
SACMAT 2013 - Proceedings of the 18th ACM Symposium on Acces...
收藏 引用
18th acm symposium on access control models and technologies, SacmAT 2013
the proceedings contain 30 papers. the topics discussed include: privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule;evolving role definitions through permission invo...
来源: 评论
SacmAT'10 - Proceedings of the 15th acm symposium on access control models and technologies
SACMAT'10 - Proceedings of the 15th ACM Symposium on Access ...
收藏 引用
15th acm symposium on access control models and technologies, SacmAT 2010
the proceedings contain 19 papers. the topics discussed include: a model of triangulating environments for policy authoring;towards analyzing complex operating system access control configurations;monitoring security ...
来源: 评论