咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是91-100 订阅
排序:
CMCAP: Ephemeral Sandboxes for Adaptive access control  19
CMCAP: Ephemeral Sandboxes for Adaptive Access Control
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Bucuti, Theogene Hakiza Dantu, Ram Morozov, Kirill Univ North Texas Dept Comp Sci & Engn Denton TX 76203 USA
We present CMCAP (context-mapped capabilities), a decentralized mechanism for specifying and enforcing adaptive access control policies for resource-centric security. Policies in CMCAP express runtime constraints defi... 详细信息
来源: 评论
CloudProtect - A Cloud-based Software Protection Service  19
CloudProtect - A Cloud-based Software Protection Service
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Schaad, Andreas Grohmann, Bjeorn Winzenried, Oliver Univ Appl Sci Offenburg Badstr 24 D-77652 Offenburg Germany Wibu Syst AG Ruppurer Str 52 D-76137 Karlsruhe Germany
Protecting software from illegal access, intentional modification or reverse engineering is an inherently difficult practical problem involving code obfuscation techniques and real-time cryptographic protection of cod... 详细信息
来源: 评论
CAOS: Concurrent-access Obfuscated Store  19
CAOS: Concurrent-Access Obfuscated Store
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Ordean, Mihai Ryan, Mark Galindo, David Univ Birmingham Birmingham W Midlands England Fetch AI Cambridge England
This paper proposes Concurrent-access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidt... 详细信息
来源: 评论
HITC: Data Privacy in Online Social Networks with Fine-Grained access control  19
HITC: Data Privacy in Online Social Networks with Fine-Grain...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Abdulla, Ahmed Khalil Bakiras, Spiridon Hamad Bin Khalifa Univ Coll Sci & Engn Div Informat & Comp Technol Doha Qatar
Online Social Networks (OSNs), such as Facebook and Twitter, are popular platforms that enable users to interact and socialize through their networked devices. The social nature of such applications encourages users t... 详细信息
来源: 评论
Brokering Policies and Execution Monitors for IoT Middleware  19
Brokering Policies and Execution Monitors for IoT Middleware
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Carranza, Juan Carlos Fuentes Fong, Philip W. L. Univ Calgary Calgary AB Canada
Event-based systems lie at the heart of many cloud-based Internet-of-Things (IoT) platforms. This combination of the Broker architectural style and the Publisher-Subscriber design pattern provides a way for smart devi... 详细信息
来源: 评论
Toward Detection of access control models from Source Code via Word Embedding  19
Toward Detection of Access Control Models from Source Code v...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Heaps, John Wang, Xiaoyin Breaux, Travis Niu, Jianwei Univ Texas San Antonio San Antonio TX 78249 USA Carnegie Mellon Univ Pittsburgh PA 15213 USA
Advancement in machine learning techniques in recent years has led to deep learning applications on source code. While there is little research available on the subject, the work that has been done shows great potenti... 详细信息
来源: 评论
A Rule-based Approach to the Decidability of Safety of ABACα  19
A Rule-based Approach to the Decidability of Safety of ABACα
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Marin, Mircea Kutsia, Temur Dundua, Besik West Univ Timisoara Timisoara Romania Johannes Kepler Univ Linz RISC Linz Austria Tbilisi State Univ VIAM Tbilisi Georgia Int Black Sea Univ Tbilisi Georgia
ABAC(alpha) is a foundational model for attribute-based access control with a minimal set of capabilities to configure many access control models of interest, including the dominant traditional ones: discretionary (DA... 详细信息
来源: 评论
access control for Binary Integrity Protection using Ethereum  19
Access Control for Binary Integrity Protection using Ethereu...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Stengele, Oliver Baumeister, Andreas Birnstill, Pascal Hartenstein, Hannes Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany Fraunhofer IOSB Karlsruhe Germany
The integrity of executable binaries is essential to the security of any device that runs them. At best, a manipulated binary can leave the system in question open to attack, and at worst, it can compromise the entire... 详细信息
来源: 评论
Towards Effective Verification of Multi-Model access control Properties  19
Towards Effective Verification of Multi-Model Access Control...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Berger, Bernhard J. Maeder, Christian Nguempnang, Rodrigue Wete Sohr, Karsten Rubio-Medrano, Carlos Univ Bremen Bremen Germany Arizona State Univ Tempe AZ USA
Many existing software systems like logistics systems or enterprise applications employ data security in a more or less ad hoc fashion. Our approach focuses on access control such as permission-based discretionary acc... 详细信息
来源: 评论
Efficient and Extensible Policy Mining for Relationship-Based access control  19
Efficient and Extensible Policy Mining for Relationship-Base...
收藏 引用
24th acm symposium on access control models and technologies (SacmAT)
作者: Bui, Thang Stoller, Scott D. Le, Hieu SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities. ReBAC policy... 详细信息
来源: 评论