咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 354 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 82 篇 控制科学与工程
    • 34 篇 信息与通信工程
    • 23 篇 电气工程
    • 9 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 5 篇 交通运输工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 冶金工程
    • 2 篇 建筑学
  • 44 篇 管理学
    • 28 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 25 篇 理学
    • 20 篇 数学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 15 篇 法学
    • 12 篇 社会学
    • 3 篇 法学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 150 篇 access control
  • 23 篇 security
  • 17 篇 rbac
  • 16 篇 authorization
  • 13 篇 privacy
  • 11 篇 internet of thin...
  • 11 篇 analytical model...
  • 9 篇 role-based acces...
  • 9 篇 relationship-bas...
  • 9 篇 attribute-based ...
  • 8 篇 xacml
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 media access pro...
  • 6 篇 throughput
  • 6 篇 quality of servi...
  • 6 篇 wireless lan
  • 5 篇 abac
  • 5 篇 policy mining
  • 5 篇 xml

机构

  • 7 篇 purdue univ w la...
  • 6 篇 carnegie mellon ...
  • 6 篇 purdue univ dept...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 suny stony brook...
  • 3 篇 univ kent sch co...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ genoa dipar...
  • 2 篇 ecole polytech f...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...

作者

  • 19 篇 bertino elisa
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 crampton jason
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 7 篇 ray indrakshi
  • 7 篇 stoller scott d.
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 thuraisingham bh...
  • 6 篇 carminati barbar...
  • 6 篇 xu dianxiang
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 ferrara anna lis...

语言

  • 448 篇 英文
  • 9 篇 其他
  • 4 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Symposium on Access Control Models and Technologies"
462 条 记 录,以下是81-90 订阅
排序:
Investigation of Suitable MAC Protocols for Optical Wireless Body-Area Networks
Investigation of Suitable MAC Protocols for Optical Wireless...
收藏 引用
International symposium on Communication Systems, Networks and Digital Signal Processing, CNSDSP
作者: Christos Giachoudis Mohammad Ali Khalighi Stanislav Zvanovec Vasilis K. Papanikolaou Sotiris A. Tegos George K. Karagiannidis Aix-Marseille University CNRS Centrale Med Fresnel Institute Marseille France Faculty of Electrical Engineering Czech Technical University in Prague Prague Czech Republic Erlangen-Nuremberg University (FAU) Erlangen Germany Aristotle University of Thessaloniki Thessaloniki Greece Lebanese American University (LAU) Beirut Lebanon
We consider the use of optical wireless data transmission from the medical nodes in wireless body-area networks (WBANs) for monitoring a patient's vital signs. To investigate efficient medium-access control (MAC) ... 详细信息
来源: 评论
Active Learning of Relationship-Based access control Policies  20
Active Learning of Relationship-Based Access Control Policie...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Understanding access control policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced access control policy in a system is no... 详细信息
来源: 评论
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based access control Model of Android  20
Accept - Maybe - Decline: Introducing Partial Consent for th...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Momen, Nurul Bock, Sven Fritsch, Lothar Karlstad Univ Karlstad Sweden Tech Univ Berlin Berlin Germany
the consent to personal data sharing is an integral part of modern access control models on smart devices. this paper examines the possibility of registering conditional consent which could potentially increase trust ... 详细信息
来源: 评论
A Decision Tree Learning Approach for Mining Relationship-Based access control Policies  20
A Decision Tree Learning Approach for Mining Relationship-Ba...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Bui, thang Stoller, Scott D. SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing, by allowing policies to be expressed in terms of chains of relationship... 详细信息
来源: 评论
AQUA: An Efficient Solver for the User Authorization Query Problem  20
AQUA: An Efficient Solver for the User Authorization Query P...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Armando, Alessandro Gazzarata, Giorgia A. Turkmen, Fatih Univ Genoa DIBRIS Genoa Italy Univ Groningen Groningen Netherlands
We present AQUA, a solver for the User Authorization Query (UAQ) problem in Role-Based access control (RBAC). the UAQ problem amounts to determining a set of roles granting a given set of permissions, satisfying a col... 详细信息
来源: 评论
Matrix Decomposition: Analysis of an access control Approach on Transaction-based DAGs without Finality  20
Matrix Decomposition: Analysis of an Access Control Approach...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Jacob, Florian Becker, Luca Grashoefer, Jan Hartenstein, Hannes Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany
the Matrix message-oriented middleware(1) is gaining momentum as a basis for a decentralized, secure messaging system as shown, for example, by its deployment within the French government and by the Mozilla foundation... 详细信息
来源: 评论
Multi-party access control-10 Years of Successes and Lessons Learned  20
Multi-party Access Control-10 Years of Successes and Lessons...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Squicciarini, Anna Cinzia Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA
As end-users have been asked to take on management tasks for their content and online resources, access control mechanisms have played an increasingly important role in a broad range of applications. these include dat... 详细信息
来源: 评论
A data access model for privacy-preserving cloud-iot architectures  20
A data access model for privacy-preserving cloud-iot archite...
收藏 引用
25th acm symposium on access control models and technologies, SacmAT 2020
作者: Fernández, Maribel Tapia, Alex Franch Jaimunk, Jenjira Chamorro, Manuel Martinez thuraisingham, Bhavani King's College London London United Kingdom University of Texas at Dallas Dallas United States
We propose a novel data collection and data sharing model for cloud-IoT architectures with an emphasis on data privacy. this model has been implemented in Privasee, an open source platform for privacy-aware web-applic... 详细信息
来源: 评论
Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare in Organizations  20
Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfar...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Bhatt, Paras Bhatt, Smriti Ko, Myung Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA Univ Texas San Antonio Dept Comp & Cyber Secur San Antonio TX USA
Recently, Internet of things (IoT) devices and applications are becoming increasingly popular among users in various IoT domains, such as Wearable IoT, Smart Cities, Smart Home, and Smart Industry. With a range of IoT... 详细信息
来源: 评论
Benchmarking UAQ Solvers  20
Benchmarking UAQ Solvers
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Armando, Alessandro Gazzarata, Giorgia Turkmen, Fatih Univ Genoa DIBRIS Genoa Italy Univ Groningen Groningen Netherlands
the User Authorization Query (UAQ) Problem is key for RBAC systems that aim to offer permission level user-system interaction, where the system automatically determines the roles to activate in order to enable the req... 详细信息
来源: 评论