咨询与建议

限定检索结果

文献类型

  • 39 篇 会议

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 35 篇 计算机科学与技术...
    • 18 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 16 篇 access control
  • 4 篇 privacy
  • 3 篇 internet of thin...
  • 3 篇 attribute-based ...
  • 3 篇 authorization
  • 2 篇 relationship-bas...
  • 2 篇 attributes
  • 1 篇 decentralized
  • 1 篇 user authorizati...
  • 1 篇 role-based acces...
  • 1 篇 publish-subscrib...
  • 1 篇 model learning
  • 1 篇 distributed ledg...
  • 1 篇 rbac
  • 1 篇 program analysis
  • 1 篇 3d repo
  • 1 篇 policy informati...
  • 1 篇 static program a...
  • 1 篇 uaq
  • 1 篇 context-sensitiv...

机构

  • 3 篇 univ genoa dibri...
  • 2 篇 university of lu...
  • 2 篇 eindhoven univer...
  • 2 篇 department of co...
  • 2 篇 univ groningen g...
  • 1 篇 university of ca...
  • 1 篇 nc state univ ra...
  • 1 篇 software school ...
  • 1 篇 univ bergamo sop...
  • 1 篇 university of so...
  • 1 篇 karlstad univ ka...
  • 1 篇 sap secur res so...
  • 1 篇 hitec luxembourg...
  • 1 篇 north carolina s...
  • 1 篇 texas a&m univ c...
  • 1 篇 department of co...
  • 1 篇 royal holloway u...
  • 1 篇 arizona state un...
  • 1 篇 advanced system ...
  • 1 篇 fraunhofer igd d...

作者

  • 2 篇 zannone nicola
  • 2 篇 rubio-medrano ca...
  • 2 篇 takabi hassan
  • 2 篇 enck william
  • 2 篇 turkmen fatih
  • 2 篇 crampton jason
  • 2 篇 cramer marcos
  • 2 篇 tripunitara mahe...
  • 2 篇 armando alessand...
  • 2 篇 sandhu ravi
  • 2 篇 ahn gail-joon
  • 2 篇 bhatt smriti
  • 2 篇 dudzik w.f.
  • 1 篇 anjum iffat
  • 1 篇 rosa marco
  • 1 篇 gupta maanak
  • 1 篇 jacob florian
  • 1 篇 capkun srdjan
  • 1 篇 ahmad tahir
  • 1 篇 yolum pinar

语言

  • 38 篇 英文
  • 1 篇 其他
检索条件"任意字段=20th ACM Symposium on Access Control Models and Technologies, SACMAT 2015"
39 条 记 录,以下是1-10 订阅
排序:
Proceedings of acm symposium on access control models and technologies, sacmat
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
20th acm symposium on access control models and technologies, sacmat 2015
the proceedings contain 24 papers. the topics discussed include: Mohawk+T: efficient analysis of administrative temporal role-based access control (ATRBAC) policies;automated inference of access control policies for w...
来源: 评论
sacmat'08 - Proceedings of the 13th acm symposium on access control models and technologies
SACMAT'08 - Proceedings of the 13th ACM Symposium on Access ...
收藏 引用
13th acm symposium on access control models and technologies, sacmat'08
the proceedings contain 20 papers. the topics discussed include: fast exact and heuristic methods for role minimization problems;migrating to optimal RBAC with minimal perturbation;mining roles with semantic meanings;...
来源: 评论
sacmat 2024 - Proceedings of the 29th acm symposium on access control models and technologies
SACMAT 2024 - Proceedings of the 29th ACM Symposium on Acces...
收藏 引用
29th acm symposium on access control models and technologies, sacmat 2024
the proceedings contain 20 papers. the topics discussed include: ToneCheck: unveiling the impact of dialects in privacy policy;make split, not hijack: preventing feature-space hijacking attacks in split learning;makin...
来源: 评论
Privacy and access control;How are these twoconcepts related?  15
Privacy and access control;How are these twoconcepts related...
收藏 引用
20th acm symposium on access control models and technologies, sacmat 2015
作者: Squicciarini, Anna Yu, Ting College of Information Sciences and Technology Pennsylvania State University United States Qatar Computing Research Institute Doha Qatar
No abstract available.
来源: 评论
Hard instances for verification problems in access control  15
Hard instances for verification problems in access control
收藏 引用
20th acm symposium on access control models and technologies, sacmat 2015
作者: Mousavi, Nima Tripunitara, Mahesh Google Inc. Waterloo Canada ECE University of Waterloo Waterloo Canada
We address the generation and analysis of hard instances for verification problems in access control that are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu... 详细信息
来源: 评论
A logical approach to restricting access in online social networks  15
A logical approach to restricting access in online social ne...
收藏 引用
20th acm symposium on access control models and technologies, sacmat 2015
作者: Cramer, Marcos Pang, Jun Zhang, Yang University of Luxembourg Luxembourg
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de... 详细信息
来源: 评论
Commune: Shared ownership in an agnostic cloud  15
Commune: Shared ownership in an agnostic cloud
收藏 引用
20th acm symposium on access control models and technologies, sacmat 2015
作者: Soriente, Claudio Karame, Ghassan O. Ritzdorf, Hubert Marinovic, Srdjan Capkun, Srdjan ETH Zurich Switzerland NEC Laboratories Germany Wireless Registry Inc. United States
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes access control decisions. Existing cloud... 详细信息
来源: 评论
Declarative access control for Aggregations of Multiple Ownership Data  20
Declarative Access Control for Aggregations of Multiple Owne...
收藏 引用
25th acm symposium on access control models and technologies (sacmat)
作者: Rosa, Marco Di Cerbo, Francesco Lozoya, Rocio Cabrera SAP Secur Res Sophia Antipolis France Univ Bergamo Sophia Antipolis France
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal fr... 详细信息
来源: 评论
Preventing information inference in access control  15
Preventing information inference in access control
收藏 引用
20th acm symposium on access control models and technologies, sacmat 2015
作者: Paci, Federica Zannone, Nicola University of Southampton United Kingdom Eindhoven University of Technology Netherlands
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data online raises significant privacy conce... 详细信息
来源: 评论
Active Learning of Relationship-Based access control Policies  20
Active Learning of Relationship-Based Access Control Policie...
收藏 引用
25th acm symposium on access control models and technologies (sacmat)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Understanding access control policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced access control policy in a system is no... 详细信息
来源: 评论