咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是171-180 订阅
排序:
Dynamic analysis of body control module  14
Dynamic analysis of body control module
收藏 引用
14th symposium on International Automotive Technology, SIAT 2015
作者: Mahajan, Nikhil V. Shriniwas, Chippa P. Abhijit, Majage S. Vishwakarma Institute of Technology India Finite Four Technologies India
Nowadays, the passenger cars are employing more and more electronic devices for controlling various mechanisms. this has increased the demand for such equipments in the passenger car. the electronic devices for contro... 详细信息
来源: 评论
Dynamic Game access control based on Trust
Dynamic Game Access Control based on Trust
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications
作者: Shunan Ma State Key Lab. of Inf. Security Inst. of Inf. Eng. Beijing China
access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, ... 详细信息
来源: 评论
Redaction based RDF access control Language  14
Redaction based RDF Access Control Language
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Rachapalli, Jyothsna Khadilkar, Vaibhav Kantarcioglu, Murat thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
We propose an access control language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF access control. the access control language ... 详细信息
来源: 评论
Attribute-Based access control models and Beyond  15
Attribute-Based Access Control Models and Beyond
收藏 引用
Proceedings of the 10th acm symposium on Information, Computer and Communications Security
作者: Ravi Sandhu University of Texas at San Antonio USA
this talk will provide a perspective on attribute-based access control (ABAC). the ongoing authorization leap from rights to attributes offers numerous compelling benefits. Decisions about user, subject, object and co... 详细信息
来源: 评论
access control models for Geo-Social Computing Systems  14
Access Control Models for Geo-Social Computing Systems
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Tarameshloo, Ebrahim Fong, Philip W. L. Univ Calgary Dept Comp Sci Calgary AB Canada
A Geo-Social Computing System (GSCS) allows users to declare their current locations, and uses these declared locations to make authorization decisions. Recent years have seen the emergence of a new generation of soci... 详细信息
来源: 评论
Anomaly Detection and Visualization in Generative RBAC models  14
Anomaly Detection and Visualization in Generative RBAC Model...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Leitner, Maria Rinderle, Stefanie Univ Vienna Fac Comp Sci Vienna Austria SBA Res Vienna Austria
With the wide use of Role-based access control (RBAC), the need for monitoring, evaluation, and verification of RBAC implementations (e.g., to evaluate ex post which users acting in which roles were authorized to exec... 详细信息
来源: 评论
Challenges in Making access control Sensitive to the "Right" Contexts  15
Challenges in Making Access Control Sensitive to the "Right"...
收藏 引用
Proceedings of the 20th acm symposium on access control models and technologies
作者: Trent Jaeger Pennsylvania State University University Park PA USA
access control is a fundamental security mechanism that both protects processes from attacks and confines compromised processes that may try to propagate an attack. Nonetheless, we still see an ever increasing number ... 详细信息
来源: 评论
An access control Concept for Novel Automotive HMI Systems  14
An Access Control Concept for Novel Automotive HMI Systems
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Gansel, Simon Schnitzer, Stephan Gilbeau-Hammoud, Ahmad Friesen, Viktor Duerr, Frank Rothermel, Kurt Maihoefer, Christian Daimler AG Syst Architecture & Platforms Dept Mercedes Benz Cars Div Sindelfingen Germany Univ Stuttgart Inst Parallel & Distributed Syst Stuttgart Germany
the relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer ... 详细信息
来源: 评论
Policy models to Protect Resource Retrieval  14
Policy Models to Protect Resource Retrieval
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Vijayakumar, Hayawardh Ge, Xinyang Jaeger, Trent Penn State Univ Dept Comp Sci & Engn Syst & Internet Infrastruct Secur Lab University Pk PA 16802 USA
Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabi... 详细信息
来源: 评论
Path Conditions and Principal Matching: A New Approach to access control  14
Path Conditions and Principal Matching: A New Approach to Ac...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Crampton, Jason Sellwood, James Royal Holloway Univ London Egham Surrey England
Traditional authorization policies are user-centric, in the sense that authorization is defined, ultimately, in terms of user identities. We believe that this user-centric approach is inappropriate for many applicatio... 详细信息
来源: 评论