咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是11-20 订阅
排序:
SacmAT 2020 - Proceedings of the 25th acm symposium on access control models and technologies
SACMAT 2020 - Proceedings of the 25th ACM Symposium on Acces...
收藏 引用
25th acm symposium on access control models and technologies, SacmAT 2020
the proceedings contain 24 papers. the topics discussed include: metering graphical data leakage with snowman;visualizing and interpreting RNN models in URL-based phishing detection;parallel space traveling: a securit...
来源: 评论
Hierarchical Key Assignment Schemes with Key Rotation  29
Hierarchical Key Assignment Schemes with Key Rotation
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Belfiore, Roberta Cimorelli De Santis, Alfredo Ferrara, Anna Lisa Masucci, Barbara Univ Molise Dept Biosci Div Comp Sci Campobasso Italy Univ Salerno Dept Comp Sci Fisciano Italy
Hierarchical structures are frequently used to manage access to sensitive data in various contexts, ranging from organizational settings to IoT networks. A Hierarchical Key Assignment Scheme (HKAS) is designed to cryp... 详细信息
来源: 评论
Poster: How to Raise a Robot - Beyond access control Constraints in Assistive Humanoid Robots  23
Poster: How to Raise a Robot - Beyond Access Control Constra...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Hemken, Niklas Jacob, Florian Peller-Konrad, Fabian Kartmann, Rainer Asfour, Tamim Hartenstein, Hannes KIT Karlsruhe Germany
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they als... 详细信息
来源: 评论
Obligation Management Framework for Usage control  29
Obligation Management Framework for Usage Control
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Joumaa, Hussein Hariri, Ali Petrovska, Ana Osliak, Oleksii Dimitrakos, theo Crispo, Bruno Univ Trento Dept Informat Engn & Comp Sci Trento Italy Huawei Technol Duesseldorf GmbH Munich Germany Univ Kent Sch Comp Canterbury Kent England
Obligations were introduced in access and usage control as a mechanism to specify mandatory actions to be fulfilled as part of authorization. In this paper, we address challenges related to obligation management in ac... 详细信息
来源: 评论
Towards Automated Learning of access control Policies Enforced by Web Applications  23
Towards Automated Learning of Access Control Policies Enforc...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amir SUNY Albany Albany NY 12222 USA
Obtaining an accurate specification of the access control policy enforced by an application is essential in ensuring that it meets our security/privacy expectations. this is especially important as many of real-world ... 详细信息
来源: 评论
SecureCheck: User-Centric and Geolocation-Aware access Mediation Contracts for Sharing Private Data  29
SecureCheck: User-Centric and Geolocation-Aware Access Media...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Hopkins, Jacob Rubio-Medrano, Carlos Texas A&M Univ Corpus Christi Corpus Christi TX USA
Data oversharing is a critical issue in today's technologically driven society. Numerous entities, i.e., corporations, governments, criminal groups, are collecting individuals' data. One potential cause is tha... 详细信息
来源: 评论
Poster: Integrating Spatio-temporal Authorization With Generic Cloud-based Software Architecture for Internet Of things Devices  23
Poster: Integrating Spatio-temporal Authorization With Gener...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Moncivais, Marshal Al Lail, Mustafa Texas A&M Int Univ Laredo TX 78041 USA
the significant rise in the usage of IoT devices and their security issues has created a demand for improved security for these systems. Unfortunately, no standard IoT architecture exists, making the development of se... 详细信息
来源: 评论
Security Analysis of access control Policies for Smart Homes  23
Security Analysis of Access Control Policies for Smart Homes
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Belfiore, Roberta Cimorelli Ferrara, Anna Lisa Univ Molise Campobasso Italy
Ensuring security is crucial in smart home settings, where only authorized users should have access to home devices. Over the past decade, researchers have focused on developing access control policies and evaluating ... 详细信息
来源: 评论
Prompting LLM to Enforce and Validate CIS Critical Security control  29
Prompting LLM to Enforce and Validate CIS Critical Security ...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Ahmed, Mohiuddin Wei, Jinpeng Al-Shaer, Ehab Univ North Carolina Charlotte Software & Informat Syst Charlotte NC 28223 USA Carnegie Mellon Univ Sch Comp Sci Pittsburgh PA 15213 USA
Proper security control enforcement reduces the attack surface and protects the organizations against attacks. Organizations like NIST and CIS (Center for Internet Security) provide critical security controls (CSCs) a... 详细信息
来源: 评论
Pairing Human and Artificial Intelligence: Enforcing access control Policies with LLMs and Formal Specifications  29
Pairing Human and Artificial Intelligence: Enforcing Access ...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Rubio-Medrano, Carlos E. Kotak, Akash Wang, Wenlu Sohr, Karsten Texas A&M Univ Corpus Christi Corpus Christi TX USA Univ Bremen Bremen Germany
Large Language models (LLMs), such as ChatGPT and Google Bard, have performed interestingly well when assisting developers on computer programming tasks, a.k.a., coding, thus potentially resulting in convenient and fa... 详细信息
来源: 评论