咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是1-10 订阅
排序:
SacmAT 2024 - proceedings of the 29th acm symposium on access control models and technologies
SACMAT 2024 - Proceedings of the 29th ACM Symposium on Acces...
收藏 引用
29th acm symposium on access control models and technologies, SacmAT 2024
The proceedings contain 20 papers. The topics discussed include: ToneCheck: unveiling the impact of dialects in privacy policy;make split, not hijack: preventing feature-space hijacking attacks in split learning;makin...
来源: 评论
SacmAT 2023 - proceedings of the 28th acm symposium on access control models and technologies
SACMAT 2023 - Proceedings of the 28th ACM Symposium on Acces...
收藏 引用
28th acm symposium on access control models and technologies, SacmAT 2023
The proceedings contain 25 papers. The topics discussed include: access control vulnerabilities in network protocol implementations: how attackers exploit them and what to do about it;a framework for privacy-preservin...
来源: 评论
SacmAT 2022 - proceedings of the 27th acm symposium on access control models and technologies
SACMAT 2022 - Proceedings of the 27th ACM Symposium on Acces...
收藏 引用
27th acm symposium on access control models and technologies, SacmAT 2022
The proceedings contain 29 papers. The topics discussed include: modular composition of access control policies: a framework to build multi-site multi-level combinations;a study of application sandbox policies in Linu...
来源: 评论
SacmAT 2021 - proceedings of the 26th acm symposium on access control models and technologies
SACMAT 2021 - Proceedings of the 26th ACM Symposium on Acces...
收藏 引用
26th acm symposium on access control models and technologies, SacmAT 2021
The proceedings contain 19 papers. The topics discussed include: backdoor attacks to graph neural networks;analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research;towards a theory for sem...
来源: 评论
Cryptographic Enforcement of access control Policies: models, Applications, and Future Directions  29
Cryptographic Enforcement of Access Control Policies: Models...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Masucci, Barbara Univ Salerno Dept Comp Sci Fisciano Italy
Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements. Among the different techniques ... 详细信息
来源: 评论
The Category-Based Approach to access control, Obligations and Privacy  23
The Category-Based Approach to Access Control, Obligations a...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Fernandez, Maribel Kings Coll London London England
The category-based access control metamodel provides an axiomatic framework for the specification of access control models. In this talk, we give an overview of the category-based approach to access control, obligatio... 详细信息
来源: 评论
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots  29
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Hemken, Niklas Jacob, Florian Teernava, Fabian Kartmann, Rainer Asfour, Tamim Hartenstein, Hannes Karlsruhe Inst Technol Karlsruhe Germany
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they als... 详细信息
来源: 评论
A Bargaining-Game Framework for Multi-Party access control  29
A Bargaining-Game Framework for Multi-Party Access Control
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Mehri, Gelareh Hasel Monmege, Benjamin Bertolissi, Clara Zannone, Nicola Eindhoven Univ Technol Eindhoven Netherlands Aix Marseille Univ CNRS LIS Marseille France
Multi-party access control is emerging to protect shared resources in collaborative environments. Existing multi-party access control models often lack essential features to address the challenges characterizing colla... 详细信息
来源: 评论
Converting Rule-Based access control Policies: From Complemented Conditions to Deny Rules  29
Converting Rule-Based Access Control Policies: From Compleme...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Ruiz, Josue A. Narendran, Paliath Masoumzadeh, Amir Iyer, Padmavathi SUNY Albany Univ Albany Albany NY 12246 USA Drury Univ Springfield MO USA
Using access control policy rules with deny effects (i.e., negative authorization) can be preferred to using complemented conditions in the rules as they are often easier to comprehend in the context of large policies... 详细信息
来源: 评论
A Self-Sovereign Identity Approach to Decentralized access control with Transitive Delegations  29
A Self-Sovereign Identity Approach to Decentralized Access C...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Vrielynck, Pieter-Jan Van hamme, Tim Ghostin, Rawad Lagaisse, Bert Preuveneers, Davy Joosen, Wouter Katholieke Univ Leuven DistriNet B-3001 Leuven Belgium
In this paper, we introduce a new decentralized access control framework with transitive delegation capabilities that tackles the performance and scalability limitations of the existing state-of-the-art solutions. In ... 详细信息
来源: 评论