咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 463 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 355 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 83 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 447 篇 英文
  • 11 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
463 条 记 录,以下是141-150 订阅
排序:
IMPROVE - Identifying Minimal PROfile VEctors for similarity based access control  15
IMPROVE - Identifying Minimal PROfile VEctors for similarity...
收藏 引用
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA)
作者: Misra, Gaurav Such, Jose M. Balogun, Hamed Univ Lancaster Secur Lancaster Lancaster England
there is ample evidence which shows that social media users struggle to make appropriate access control decisions while disclosing their information and smarter mechanisms are needed to assist them. Using profile info... 详细信息
来源: 评论
Modelling and simulation of distributed time critical communication and control systems in vehicles or vehicle networks
Modelling and simulation of distributed time critical commun...
收藏 引用
14th IFAC symposium on control in Transportation Systems (CTS)
作者: Diekhake, P. Kurczveil, T. Becker, U. Tech Univ Carolo Wilhelmina Braunschweig Inst Traff Safety & Automat Engn D-35108 Braunschweig CO Germany
this paper is dedicated to ate methodical analysis of distributed communication and control systems, such like systems inside modern vehicles or systems of networked vehicles, For runtime and time-behavior analyses, t... 详细信息
来源: 评论
Flight control System Modeling with SysML to Support Validation, Qualification and Certification
Flight Control System Modeling with SysML to Support Validat...
收藏 引用
14th IFAC symposium on control in Transportation Systems (CTS)
作者: Mhenni, Faida Choley, Jean-Yves Nga Nguyen Frazza, Christophe SUPMECA Quartz EA7393 St Ouen France EISTI Quartz EA7393 Ceray Pontoise France DGA TA SIE Balma France
the introduction of new technologies to build 'More Electric Aircraft' induces new challenges for both the design and safety analysis of new aircraft. A model-based approach is needed for both design and valid... 详细信息
来源: 评论
Enterprise search / search over corporates systems
Enterprise search / search over corporates systems
收藏 引用
International symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Stanislav Dvorščák Kristína Machová Dept. of Cybernetics and Artificial Intelligence FEI TU of Košice Slovak Republic
An enterprise search represents a new area for a searching. this article provide base information what the enterprise search is about and the information about an implementation.
来源: 评论
SacmAT 2014 - Proceedings of the 19th acm symposium on access control models and technologies
SACMAT 2014 - Proceedings of the 19th ACM Symposium on Acces...
收藏 引用
19th acm symposium on access control models and technologies, SacmAT 2014
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based access control;an access control concept for novel automotive HMI systems;monitor placem...
来源: 评论
Privacy and access control;How are these twoconcepts related?  15
Privacy and access control;How are these twoconcepts related...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Squicciarini, Anna Yu, Ting College of Information Sciences and Technology Pennsylvania State University United States Qatar Computing Research Institute Doha Qatar
No abstract available.
来源: 评论
Adaptive control of underactuated mechanical systems using improved "Sigmoid Generated Fixed Point Transformation" and scheduling strategy
Adaptive control of underactuated mechanical systems using i...
收藏 引用
International symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Adrienn Dineva József K. Tar Annamária Várkonyi-Kóczy Vincenzo Piuri Department of Information Technologies Università degli Studi di Milano Crema Italy Doctoral School of Applied Informatics and Applied Mathematics Óbuda University Budapest Hungary Obudai Egyetem Budapest HU Institute of Mechatronics and Vehicle Engineering Óbuda University Budapest Hungary Department of Mathematics and Informatics J. Selye University Komarno Slovakia
With the aim of evading the difficulties of the Lyapunov function-based techniques in the control of nonlinear systems recently the Sigmoid Generated Fixed Point Transformation (SGFPT) has been introduced. this system... 详细信息
来源: 评论
Hard instances for verification problems in access control  15
Hard instances for verification problems in access control
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Mousavi, Nima Tripunitara, Mahesh Google Inc. Waterloo Canada ECE University of Waterloo Waterloo Canada
We address the generation and analysis of hard instances for verification problems in access control that are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu... 详细信息
来源: 评论
A logical approach to restricting access in online social networks  15
A logical approach to restricting access in online social ne...
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Cramer, Marcos Pang, Jun Zhang, Yang University of Luxembourg Luxembourg
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de... 详细信息
来源: 评论
Commune: Shared ownership in an agnostic cloud  15
Commune: Shared ownership in an agnostic cloud
收藏 引用
20th acm symposium on access control models and technologies, SacmAT 2015
作者: Soriente, Claudio Karame, Ghassan O. Ritzdorf, Hubert Marinovic, Srdjan Capkun, Srdjan ETH Zurich Switzerland NEC Laboratories Germany Wireless Registry Inc. United States
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes access control decisions. Existing cloud... 详细信息
来源: 评论