咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是111-120 订阅
排序:
Brokering Policies and Execution Monitors for IoT Middleware  19
Brokering Policies and Execution Monitors for IoT Middleware
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Carranza, Juan Carlos Fuentes Fong, Philip W. L. Univ Calgary Calgary AB Canada
Event-based systems lie at the heart of many cloud-based Internet-of-things (IoT) platforms. this combination of the Broker architectural style and the Publisher-Subscriber design pattern provides a way for smart devi... 详细信息
来源: 评论
A Rule-based Approach to the Decidability of Safety of ABACα  19
A Rule-based Approach to the Decidability of Safety of ABACα
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Marin, Mircea Kutsia, Temur Dundua, Besik West Univ Timisoara Timisoara Romania Johannes Kepler Univ Linz RISC Linz Austria Tbilisi State Univ VIAM Tbilisi Georgia Int Black Sea Univ Tbilisi Georgia
ABAC(alpha) is a foundational model for attribute-based access control with a minimal set of capabilities to configure many access control models of interest, including the dominant traditional ones: discretionary (DA... 详细信息
来源: 评论
Towards Effective Verification of Multi-Model access control Properties  19
Towards Effective Verification of Multi-Model Access Control...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Berger, Bernhard J. Maeder, Christian Nguempnang, Rodrigue Wete Sohr, Karsten Rubio-Medrano, Carlos Univ Bremen Bremen Germany Arizona State Univ Tempe AZ USA
Many existing software systems like logistics systems or enterprise applications employ data security in a more or less ad hoc fashion. Our approach focuses on access control such as permission-based discretionary acc... 详细信息
来源: 评论
Efficient and Extensible Policy Mining for Relationship-Based access control  19
Efficient and Extensible Policy Mining for Relationship-Base...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Bui, thang Stoller, Scott D. Le, Hieu SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities. ReBAC policy... 详细信息
来源: 评论
access control for Binary Integrity Protection using Ethereum  19
Access Control for Binary Integrity Protection using Ethereu...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Stengele, Oliver Baumeister, Andreas Birnstill, Pascal Hartenstein, Hannes Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany Fraunhofer IOSB Karlsruhe Germany
the integrity of executable binaries is essential to the security of any device that runs them. At best, a manipulated binary can leave the system in question open to attack, and at worst, it can compromise the entire... 详细信息
来源: 评论
PolTree: A Data Structure for Making Efficient access Decisions in ABAC  19
PolTree: A Data Structure for Making Efficient Access Decisi...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Nath, Ronit Das, Saptarshi Sural, Shamik Vaidya, Jaideep Atluri, Vijay IIT Kharagpur Kharagpur W Bengal India Rutgers State Univ New Brunswick NJ USA
In Attribute-Based access control (ABAC), a user is permitted or denied access to an object based on a set of rules (together called an ABAC Policy) specified in terms of the values of attributes of various types of e... 详细信息
来源: 评论
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive technologies  19
Effectively Enforcing Authorization Constraints for Emerging...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Rubio-Medrano, Carlos E. Jogani, Shaishavkumar Leitner, Maria Zhao, Ziming Ahn, Gail-Joon Arizona State Univ Tempe AZ 85281 USA AIT Vienna Austria Rochester Inst Technol Henrietta NY USA Samsung Res Mountain View CA USA
Recently, applications that deliver customized content to end-users, e.g., digital objects on top of a video stream, depending on information such as their current physical location, usage patterns, personal data, etc... 详细信息
来源: 评论
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-things  19
IoT Passport: A Blockchain-Based Trust Framework for Collabo...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Tang, Bo Kang, Hongjuan Fan, Jingwen Li, Qi Sandhu, Ravi Sichuan Changhong Elect Co Ltd Informat Secur Lab Mianyang Sichuan Peoples R China Tsinghua Univ Inst Network Sci & Cyberspace Beijing Peoples R China Tsinghua Univ BNRist Beijing Peoples R China Univ Texas San Antonio Inst Cyber Secur San Antonio TX USA Univ Texas San Antonio Dept Comp Sci San Antonio TX USA
Internet-of-things (IoT) is a rapidly-growing transformative expansion of the Internet with increasing influence on our daily life. Since the number of "things" is expected to soon surpass human population, ... 详细信息
来源: 评论
Securing Big Data: New access control Challenges and Approaches  19
Securing Big Data: New Access Control Challenges and Approac...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Kantarcioglu, Murat Univ Texas Dallas Richardson TX 75083 USA
Recent cyber attacks have shown that the leakage/stealing of big data may result in enormous monetary loss and damage to organizational reputation, and increased identity theft risks for individuals. Furthermore, in t... 详细信息
来源: 评论
Smart-AC: A New Framework Concept for Modeling access control Policy  16
Smart-AC: A New Framework Concept for Modeling Access Contro...
收藏 引用
16th International Conference on Mobile Systems and Pervasive Computing (MobiSPC) / 14th International Conference on Future Networks and Communications (FNC) / 9th International Conference on Sustainable Energy Information Technology
作者: Kashmar, Nadine Adda, Mehdi Atieh, Mirna Ibrahim, Hussein Univ Quebec Rimouski Dept Math Informat & Genie 300 Allee Ursulines Rimouski PQ Canada Lebanese Univ Fac Econ Sci & Adm Business Comp Dept Hadat Lebanon Inst Technol Maintenance Ind 175 Rue Verendrye Sept Iles PQ G4R 5B7 Canada
As new technologies grow such as Internet of things (IoT) and cloud computing, the way how people interact with devices change. the current world of interconnectivity, the heterogeneity of networks, platforms, applica... 详细信息
来源: 评论