咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是101-110 订阅
排序:
Securing Content in Decentralized Online Social Networks:Solutions, Limitations, and the Road Ahead  22
Securing Content in Decentralized Online Social Networks&#58...
收藏 引用
Proceedings of the 27th acm on symposium on access control models and technologies
作者: Roberto Di Pietro Hamad Bin Khalifa University Doha Qatar
the most popular On-line Social Networks (OSNs) are based on centralized architectures where service providers (e.g., Facebook, Twitter, or Instagram) have full control over the data published by their user---a requir... 详细信息
来源: 评论
Poster: Unified access control for Surgical Robotics  19
Poster: Unified Access Control for Surgical Robotics
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Shah, Ryan Nagaraja, Shishir Univ Strathclyde Glasgow Lanark Scotland
来源: 评论
Mutual Authorizations: Semantics and Integration Issues  19
Mutual Authorizations: Semantics and Integration Issues
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Suntaxi, Gabriela El Ghazi, Aboubakr Achraf Boehm, Klemens Karlsruhe Inst Technol Karlsruhe Germany
Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing access control models however captures this reciprocity phenomenon. In t... 详细信息
来源: 评论
Generalized Mining of Relationship-Based access control Policies in Evolving Systems  19
Generalized Mining of Relationship-Based Access Control Poli...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Relationship-based access control (ReBAC) provides a flexible approach to specify policies based on relationships between system entities, which makes them a natural fit for many modern information systems, beyond onl... 详细信息
来源: 评论
An OpenRBAC Semantic Model for access control in Vehicular Networks  19
An OpenRBAC Semantic Model for Access Control in Vehicular N...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Alsarra, Sultan Yen, I-Ling Huang, Yongtao Bastani, Farokh thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
Inter-vehicle communication has the potential to significantly improve driving safety, but also raises security concerns. the fundamental mechanism to govern information sharing behaviors is access control. Since vehi... 详细信息
来源: 评论
CMCAP: Ephemeral Sandboxes for Adaptive access control  19
CMCAP: Ephemeral Sandboxes for Adaptive Access Control
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Bucuti, theogene Hakiza Dantu, Ram Morozov, Kirill Univ North Texas Dept Comp Sci & Engn Denton TX 76203 USA
We present CMCAP (context-mapped capabilities), a decentralized mechanism for specifying and enforcing adaptive access control policies for resource-centric security. Policies in CMCAP express runtime constraints defi... 详细信息
来源: 评论
Toward Detection of access control models from Source Code via Word Embedding  19
Toward Detection of Access Control Models from Source Code v...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Heaps, John Wang, Xiaoyin Breaux, Travis Niu, Jianwei Univ Texas San Antonio San Antonio TX 78249 USA Carnegie Mellon Univ Pittsburgh PA 15213 USA
Advancement in machine learning techniques in recent years has led to deep learning applications on source code. While there is little research available on the subject, the work that has been done shows great potenti... 详细信息
来源: 评论
CAOS: Concurrent-access Obfuscated Store  19
CAOS: Concurrent-Access Obfuscated Store
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Ordean, Mihai Ryan, Mark Galindo, David Univ Birmingham Birmingham W Midlands England Fetch AI Cambridge England
this paper proposes Concurrent-access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidt... 详细信息
来源: 评论
CloudProtect - A Cloud-based Software Protection Service  19
CloudProtect - A Cloud-based Software Protection Service
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Schaad, Andreas Grohmann, Bjeorn Winzenried, Oliver Univ Appl Sci Offenburg Badstr 24 D-77652 Offenburg Germany Wibu Syst AG Ruppurer Str 52 D-76137 Karlsruhe Germany
Protecting software from illegal access, intentional modification or reverse engineering is an inherently difficult practical problem involving code obfuscation techniques and real-time cryptographic protection of cod... 详细信息
来源: 评论
HITC: Data Privacy in Online Social Networks with Fine-Grained access control  19
HITC: Data Privacy in Online Social Networks with Fine-Grain...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Abdulla, Ahmed Khalil Bakiras, Spiridon Hamad Bin Khalifa Univ Coll Sci & Engn Div Informat & Comp Technol Doha Qatar
Online Social Networks (OSNs), such as Facebook and Twitter, are popular platforms that enable users to interact and socialize through their networked devices. the social nature of such applications encourages users t... 详细信息
来源: 评论