咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是41-50 订阅
排序:
WiP: AABAC - Automated Attribute Based access control for Genomics Data  22
WiP: AABAC - Automated Attribute Based Access Control for Ge...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Reddick, David Presley, Justin Feltus, Frank Alex Shannigrahi, Susmit Tennessee Technol Univ Cookeville TN 38505 USA Clemson Univ Clemson SC USA
the COVID-19 crisis and the subsequent vaccine development have demonstrated the potential of cutting-edge genomics research. However, the privacy of these sensitive pieces of information is an area of significant con... 详细信息
来源: 评论
GreenSight: IoT-Based Greenhouse Monitoring System  14
GreenSight: IoT-Based Greenhouse Monitoring System
收藏 引用
14th symposium on Computer Applications & Industrial Electronics (ISCAIE)
作者: Fabian, Charles Bryan R. Sumalinog, Jerson S. Vicente, Paul John S. Romasanta, Joan Katherine N. NU Dasmarinas Natl Univ Philippines Manila Philippines
Greenhouse agriculture has emerged as a critical component in addressing global food security challenges, experiencing rapid growth and technological integration in recent years. this paper presents GreenSight, an IoT... 详细信息
来源: 评论
Higher-Order Relationship-Based access control: A Temporal Instantiation with IoT Applications  22
Higher-Order Relationship-Based Access Control: A Temporal I...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Arora, Chahal Rizvi, Syed Zain R. Fong, Philip W. L. Univ Calgary Calgary AB Canada
Cyberphysical systems involve connected devices that are physically embedded. these devices enter into transient relationships with one another and with the environment. We propose an access control model, HO(T)-ReBAC... 详细信息
来源: 评论
WiP: Metamodel for Continuous Authorisation and Usage control  22
WiP: Metamodel for Continuous Authorisation and Usage Contro...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Hariri, Ali Ibrahim, Amjad Dimitrakos, theo Crispo, Bruno Huawei Technol Duesseldorf GmbH German Res Ctr Munich Germany Univ Trento Dept Informat Engn & Comp Sci Trento Italy Univ Kent Sch Comp Canterbury Kent England
access control has been traditionally used to protect data and privacy. Traditional access control models (e.g., ABAC, RBAC) cannot meet modern security requirements as technologies spread over heterogeneous and dynam... 详细信息
来源: 评论
Poster: Toward Zero-Trust Path-Aware access control  22
Poster: Toward Zero-Trust Path-Aware Access Control
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Seaton, Joshua H. Hounsinou, Sena Wood, Timothy Xu, Shouhuai Brown, Philip N. Bloom, Gedare Univ Colorado Colorado Springs Colorado Springs CO 80918 USA George Washington Univ Washington DC USA
In this poster, we introduce path-aware risk scores for access control (PARSAC), a novel context-sensitive technique to enrich access requests with risk scoring of the path taken by those requests between the authenti... 详细信息
来源: 评论
Modeling and Analysis of Latencies in Multi-User, Multi-RAT Edge Computing  19
Modeling and Analysis of Latencies in Multi-User, Multi-RAT ...
收藏 引用
19th acm International symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet)
作者: Balaji, Rushabha Mehta, Neelesh B. Singh, Chandramani Univ Calif San Diego Elect & Comp Engn La Jolla CA 92093 USA Indian Inst Sci ECE Bengaluru India Indian Inst Sci Elect Syst Engn Bengaluru India
Multi-access edge computing enables resource-constrained handsets to offload their tasks to edge servers through multiple radio access technologies (RATs). However, RATs such as cellular and wireless local area networ... 详细信息
来源: 评论
Effective Evaluation of Relationship-Based access control Policy Mining  22
Effective Evaluation of Relationship-Based Access Control Po...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Mining algorithms for relationship-based access control policies produce policies composed of relationship-based patterns that justify the input authorizations according to a given system graph. the correct functionin... 详细信息
来源: 评论
the Secrecy Resilience of access control Policies and Its Application to Role Mining  22
The Secrecy Resilience of Access Control Policies and Its Ap...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Guo, Qiang Tripunitara, Mahesh BMO Financial Grp Toronto ON Canada Univ Waterloo ECE Waterloo ON Canada Univ Waterloo Waterloo ON Canada
We propose a notion that we call the secrecy resilience of an access control policy that, to our knowledge, has not been explored in prior work. We seek to capture with this notion the property inherent to an access c... 详细信息
来源: 评论
A Study of Application Sandbox Policies in Linux  22
A Study of Application Sandbox Policies in Linux
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Dunlap, Trevor Enck, William Reaves, Bradley North Carolina State Univ Raleigh NC 27695 USA
Desktop operating systems, including macOS, Windows 10, and Linux, are adopting the application-based security model pervasive in mobile platforms. In Linux, this transition is part of the movement towards two distrib... 详细信息
来源: 评论
BlueSky: Combining Task Planning and Activity-Centric access control for Assistive Humanoid Robots  22
BlueSky: Combining Task Planning and Activity-Centric Access...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Bayreuther, Saskia Jacob, Florian Grotz, Markus Kartmann, Rainer Peller-Konrad, Fabian Paus, Fabian Hartenstein, Hannes Asfour, Tamim KIT Karlsruhe Germany
In the not too distant future, assistive humanoid robots will provide versatile assistance for coping with everyday life. In their interactions with humans, not only safety, but also security and privacy issues need t... 详细信息
来源: 评论