咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是121-130 订阅
排序:
Integrate and Fire Neuron Implementation using CMOS Predictive Technology Model for 32nm  34
Integrate and Fire Neuron Implementation using CMOS Predicti...
收藏 引用
34th symposium on Microelectronics Technology and Devices (SBMicro)
作者: Maranhao, Gabriel Guimaraes, Janaina G. Univ Brasilia Dept Elect Engn Brasilia DF Brazil Univ Fed Santa Catarina Dept Control Automat & Comp Engn Blumenau Brazil
the propose of this work is to evolve the studies on neuromorphic circuits by simulating transistors models that look the most with the ones used in commercial process. Since most of data about company models contain ... 详细信息
来源: 评论
Combinatorics and Geometry for the Many-ported, Distributed and Shared Memory Architecture
Combinatorics and Geometry for the Many-ported, Distributed ...
收藏 引用
International symposium on Networks-on-Chip (NOCS)
作者: Hao Luan Alan Gatherer Futurewei Technologies Inc. Plano Texas USA
Manycore SoC architectures based on on-chip shared memory are preferred for flexible and programmable solutions in many application domains. However, the development of many ported memory is becoming increasingly chal... 详细信息
来源: 评论
System Architecture and Data Allocation/Coordination technologies of Autonomous Decentralized Database System for High Assurance  14
System Architecture and Data Allocation/Coordination Technol...
收藏 引用
14th IEEE International symposium on Autonomous Decentralized Systems (ISADS) / 3rd International Workshop on Service Assurance in System Wide Information Management (SASWIM)
作者: Perez-Leguizamo, Carlos Guadalupe Godinez-Borja, J. S. Banco Mexico Cent Bank Operating Syst Dev Div Mexico City DF Mexico
During the last few years there have been important changes in the way that consumers use the Internet and e-commerce. this exceptional expansion, combined with dynamic interactions with users and providers, is boosti... 详细信息
来源: 评论
PART: Pinning Avoidance in RDMA technologies
PART: Pinning Avoidance in RDMA Technologies
收藏 引用
International symposium on Networks-on-Chip (NOCS)
作者: Antonis Psistakis Nikos Chrysos Fabien Chaix Marios Asiminakis Michalis Giannioudis Pantelis Xirouchakis Vassilis Papaefstathiou Manolis Katevenis Institute of Computer Science Foundation for Research and Technology – Hellas (FORTH) Herakleion Crete Greece
State-of-the-art Remote Direct Memory access (RDMA) engines pin communication buffers, complicating the programming model, limiting the memory utilization, and mandating a separate memory translation subsystem spannin... 详细信息
来源: 评论
Issues and challenges of access control in the cloud  14
Issues and challenges of access control in the cloud
收藏 引用
14th International Conference on Web Information Systems and technologies, WEBIST 2018
作者: Lonetti, Francesca Marchetti, Eda ISTI-CNR Via G. Moruzzi 1 Pisa Italy
Cloud computing offers scalable and efficient information sharing and storage resources. However, the risk of security breaches for personal and private data in this computing environment is very high. access control ... 详细信息
来源: 评论
Virtualized End-to-End Management Functions for Aggregated control of Video Traffic Flows  14
Virtualized End-to-End Management Functions for Aggregated C...
收藏 引用
14th acm International symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet)
作者: Ravindran, Kaliappa Cherian, Ancy Adiththan, Arun CUNY City Coll New York NY 10031 USA
the paper describes the management and control (M&C) functions of various network nodes in an end-to-end rate-adaptive video transport system. Mobile user devices download video clips by sharing the underlying net... 详细信息
来源: 评论
CTMA: A More Efficient Channel access Method for Networks with Hidden Terminals  14
CTMA: A More Efficient Channel Access Method for Networks wi...
收藏 引用
14th acm symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN)
作者: Garcia-Luna-Aceves, J. J. Univ Calif Santa Cruz Comp Engn Dept Santa Cruz CA 95064 USA PARC Palo Alto CA 94304 USA
controlled-Tones Multiple access (CTMA) is introduced for efficient channel access in wireless networks with hidden terminals. CTMA is based on the integration of collision-avoidance handshakes with tones indicating t... 详细信息
来源: 评论
Mining Relationship-Based access control Policies  22
Mining Relationship-Based Access Control Policies
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: thang Bui Stoller, Scott D. Li, Jiajie SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing. We formulate ReBAC as an object-oriented extension of attribute-based a... 详细信息
来源: 评论
PE-WASUN 2017 - Proceedings of the 14th acm symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with MSWiM 2017
PE-WASUN 2017 - Proceedings of the 14th ACM Symposium on Per...
收藏 引用
14th acm symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, PE-WASUN 2017
the proceedings contain 12 papers. the topics discussed include: carrier resolution multiple access;CTMA: a more efficient channel access method for networks with hidden terminals;revisiting the analytical modeling of...
来源: 评论
On the application of fuzzy set theory for access control enforcement  14
On the application of fuzzy set theory for access control en...
收藏 引用
14th International Joint Conference on e-Business and Telecommunications, ICETE 2017
作者: Regateiro, Diogo Domingues Pereira, Óscar Mortagua Aguiar, Rui L. Instituto de Telecomunicaçoes DETI Universidade de Aveiro Aveiro3810-193 Portugal
access control is a vital part of any computer system. When it comes to access to data, deterministic access control models such as RBAC are still widely used today, but they lack the flexibility needed to support som... 详细信息
来源: 评论