咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是61-70 订阅
排序:
An access control Concept for Novel Automotive HMI Systems  14
An Access Control Concept for Novel Automotive HMI Systems
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Gansel, Simon Schnitzer, Stephan Gilbeau-Hammoud, Ahmad Friesen, Viktor Duerr, Frank Rothermel, Kurt Maihoefer, Christian Daimler AG Syst Architecture & Platforms Dept Mercedes Benz Cars Div Sindelfingen Germany Univ Stuttgart Inst Parallel & Distributed Syst Stuttgart Germany
the relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer ... 详细信息
来源: 评论
Policy models to Protect Resource Retrieval  14
Policy Models to Protect Resource Retrieval
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Vijayakumar, Hayawardh Ge, Xinyang Jaeger, Trent Penn State Univ Dept Comp Sci & Engn Syst & Internet Infrastruct Secur Lab University Pk PA 16802 USA
Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabi... 详细信息
来源: 评论
Declarative access control for Aggregations of Multiple Ownership Data  20
Declarative Access Control for Aggregations of Multiple Owne...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Rosa, Marco Di Cerbo, Francesco Lozoya, Rocio Cabrera SAP Secur Res Sophia Antipolis France Univ Bergamo Sophia Antipolis France
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal fr... 详细信息
来源: 评论
Path Conditions and Principal Matching: A New Approach to access control  14
Path Conditions and Principal Matching: A New Approach to Ac...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Crampton, Jason Sellwood, James Royal Holloway Univ London Egham Surrey England
Traditional authorization policies are user-centric, in the sense that authorization is defined, ultimately, in terms of user identities. We believe that this user-centric approach is inappropriate for many applicatio... 详细信息
来源: 评论
Mutual Authorizations: Semantics and Integration Issues  19
Mutual Authorizations: Semantics and Integration Issues
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Suntaxi, Gabriela El Ghazi, Aboubakr Achraf Boehm, Klemens Karlsruhe Inst Technol Karlsruhe Germany
Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing access control models however captures this reciprocity phenomenon. In t... 详细信息
来源: 评论
Deploying access control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP theorem  20
Deploying Access Control Enforcement for IoT in the Cloud-Ed...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Ahmad, Tahir Morelli, Umberto Ranise, Silvio FBK ICT Secur & Trust Unit Trento Italy Univ Genoa DIBRIS Genoa Italy
the CAP theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it... 详细信息
来源: 评论
An Actor-Based, Application-Aware access control Evaluation Framework  14
An Actor-Based, Application-Aware Access Control Evaluation ...
收藏 引用
19th acm symposium on access control models and technologies (SacmAT)
作者: Garrison, William C., III Lee, Adam J. Hinrichs, Timothy L. Univ Pittsburgh Dept Comp Sci Pittsburgh PA 15260 USA VMware Inc Palo Alto CA USA
To date, most work regarding the formal analysis of access control schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property th... 详细信息
来源: 评论
Active Learning of Relationship-Based access control Policies  20
Active Learning of Relationship-Based Access Control Policie...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Understanding access control policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced access control policy in a system is no... 详细信息
来源: 评论
Poster: A Flexible Relationship-Based access control Policy Generator  22
Poster: A Flexible Relationship-Based Access Control Policy ...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Clark, Stanley Yakovets, Nikolay Fletcher, George H. L. Zannone, Nicola Eindhoven Univ Technol Eindhoven Netherlands
A plethora of Relationship-Based access control (ReBAC) models have been proposed, varying in the types of policies they can express. this fragmentation has stifled the creation of a benchmark to directly compare the ... 详细信息
来源: 评论
A meta model for access control: Why is it needed and Is it even possible to achieve?  08
A meta model for access control: Why is it needed and Is it ...
收藏 引用
13th acm symposium on access control models and technologies, SacmAT'08
作者: Ferraiolo, David Atluri, Vijay National Institute of Standards and Technology Rutgers University
No abstract available
来源: 评论