咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是31-40 订阅
排序:
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy  23
MSNetViews: Geographically Distributed Management of Enterpr...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Anjum, Iffat Sokal, Jessica Rehman, Hafiza Ramzah Weintraub, Ben Leba, Ethan Enck, William Nita-Rotaru, Cristina Reaves, Bradley NC State Univ Raleigh NC 27695 USA Northeastern Univ Boston MA 02115 USA
Commercially-available software defined networking (SDN) technologies will play an important role in protecting the on-premises resources that remain as enterprises transition to zero trust architectures. However, exi... 详细信息
来源: 评论
ProgramAlly: Creating Custom Visual access Programs via Multi-Modal End-User Programming  24
ProgramAlly: Creating Custom Visual Access Programs via Mult...
收藏 引用
37th acm Annual symposium on User Interface Software and Technology (UIST)
作者: Herskovitz, Jaylin Xu, Andi Alharbi, Rahaf Guo, Anhong Univ Michigan Ann Arbor MI 48109 USA
Existing visual assistive technologies are built for simple and common use cases, and have few avenues for blind people to customize their functionalities. Drawing from prior work on DIY assistive technology, this pap... 详细信息
来源: 评论
SEAL: Capability-Based access control for Data-Analytic Scenarios  23
SEAL: Capability-Based Access Control for Data-Analytic Scen...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Rasifard, Hamed Gopinath, Rahul Backes, Michael Nemati, Hamed CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany Univ Sydney Sydney NSW Australia Stanford Univ Stanford CA 94305 USA
Data science is the basis for various disciplines in the Big-Data era. Due to the high volume, velocity, and variety of big data, data owners often store their data in data servers. Past few years, many computation te... 详细信息
来源: 评论
Expressive Authorization Policies using Computation Principals  23
Expressive Authorization Policies using Computation Principa...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Gollamudi, Anitha Chong, Stephen Univ Massachusetts Lowell Lowell MA 01854 USA Harvard Univ Cambridge MA 02138 USA
In authorization logics, it is natural to treat computations as principals, since systems need to decide how much authority to give computations when they execute. But unlike other kinds of principals, the authority t... 详细信息
来源: 评论
Insights On Industrial Firewall and Its Application in Networked control Systems  24
Insights On Industrial Firewall and Its Application in Netwo...
收藏 引用
14th International Conference on Communication and Network Security, ICCNS 2024
作者: Wan, Ming Shi, Taofeng Wang, Xinjun Li, Dong Zhao, Yihao School of Cyber Science and Engineering Liaoning University Liaoning Shenyang China School of Information Liaoning University Liaoning Shenyang China
Current networked control systems are facing more and more severe challenges of cyber threats, and various intrinsic network-related vulnerabilities may cause serious damage to industrial production. To strengthen the... 详细信息
来源: 评论
access control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit them and What To Do About It  23
Access Control Vulnerabilities in Network Protocol Implement...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: dos Santos, Daniel Ricardo Forescout Eindhoven Netherlands
Authentication and access control mechanisms should verify the identity of users of a system and ensure that these users only act within their intended permissions. these mechanisms, alongside audit or intrusion detec... 详细信息
来源: 评论
Poster: A Flexible Relationship-Based access control Policy Generator  22
Poster: A Flexible Relationship-Based Access Control Policy ...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Clark, Stanley Yakovets, Nikolay Fletcher, George H. L. Zannone, Nicola Eindhoven Univ Technol Eindhoven Netherlands
A plethora of Relationship-Based access control (ReBAC) models have been proposed, varying in the types of policies they can express. this fragmentation has stifled the creation of a benchmark to directly compare the ... 详细信息
来源: 评论
BlueSky: Physical access control: Characteristics, Challenges, and Research Opportunities  22
BlueSky: Physical Access Control: Characteristics, Challenge...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Masoumzadeh, Amirreza van der Laan, Hans Dercksen, Albert SUNY Albany Albany NY 12222 USA Nedap NV Groenlo Netherlands
Physical access control (PAC) is an integral part of the physical security system of any organization. However, despite the size of the PAC industry and its importance in securing our physical environments, public res... 详细信息
来源: 评论
Poster: ASQL - Attribute Based access control Extension for SQL  22
Poster: ASQL - Attribute Based Access Control Extension for ...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Paul, Proteet Gupta, Tushar Sural, Shamik Indian Inst Technol Kharagpur W Bengal India
In recent years, several attempts have been made to address the challenges associated with the implementation of Attribute Based access control (ABAC). However, almost all of these look at ABAC as an application-level... 详细信息
来源: 评论
Modular Composition of access control Policies: A Framework to Build Multi-Site Multi-Level Combinations  22
Modular Composition of Access Control Policies: A Framework ...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Bertolissi, Clara Fernandez, Maribel Univ Aix Marseille CNRS UMR 7020 Marseille France Kings Coll London London England
We present general notions of access control policy composition using the CBAC model. We show that CBAC provides a uniform framework to define compositions of heterogeneous policies (e.g., RBAC and ABAC policies) as r... 详细信息
来源: 评论