咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是121-130 订阅
排序:
Automated Coverage-Based Testing of XacmL Policies  18
Automated Coverage-Based Testing of XACML Policies
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Xu, Dianxiang Shrestha, Roshan Shen, Ning Boise State Univ Dept Comp Sci Boise ID 83725 USA
While(1) the standard language XacmL is very expressive for specifying fine-grained access control policies, defects can get into XacmL policies for various reasons, such as misunderstanding of access control requirem... 详细信息
来源: 评论
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things  18
Authorization Framework for Secure Cloud Assisted Connected ...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Sandhu, Ravi Univ Texas San Antonio Dept Comp Sci ICS C SPECC San Antonio TX 78249 USA
Internet of Things has become a predominant phenomenon in every sphere of smart life. Connected Cars and Vehicular Internet of Things, which involves communication and data exchange between vehicles, traffic infrastru... 详细信息
来源: 评论
Securing Named Data Networks: Challenges and the Way Forward  18
Securing Named Data Networks: Challenges and the Way Forward
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Bertino, Elisa Nabeel, Mohamed Purdue Univ W Lafayette IN 47907 USA Qatar Comp Res Inst Doha Qatar
Despite decades of research on the Internet security, we constantly hear about mega data breaches and malware infections affecting hundreds of millions of hosts. The key reason is that the current threat model of the ... 详细信息
来源: 评论
Data Breach and Multiple Points to Stop It  18
Data Breach and Multiple Points to Stop It
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Yao, Danfeng (Daphne) Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
Preventing unauthorized access to sensitive data is an exceedingly complex access control problem. In this keynote, I will break down the data breach problem and give insights into how organizations could and should d... 详细信息
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
21st acm symposium on access control models and technologies, SacmAT 2016
The proceedings contain 22 papers. The topics discussed include: state-aware network access management for software-defined networks;an empirical study on user access control in online social networks;an application r...
来源: 评论
Poster: Constrained Policy Mining in Attribute Based access control  22
Poster: Constrained Policy Mining in Attribute Based Access ...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Gautam, Mayank Jha, Sadhana Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi IIT Kharagpur Kharagpur W Bengal India Rutgers State Univ New Brunswick NJ USA
In practical access control systems, it is important to enforce an upper bound on the time taken to respond to an access request. This response time is directly influenced by the size (often called the weight) of each... 详细信息
来源: 评论
Mining Relationship-Based access control Policies  22
Mining Relationship-Based Access Control Policies
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Thang Bui Stoller, Scott D. Li, Jiajie SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing. We formulate ReBAC as an object-oriented extension of attribute-based a... 详细信息
来源: 评论
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems  22
Security Analysis and Legal Compliance Checking for the Desi...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Guarda, Paolo Ranise, Silvio Siswantoro, Hari Univ Trento Fac Law Trento Italy FBK Irst Secur & Trust Trento Italy Univ Trento DISI Trento Italy
Nowadays, most of business practices involve personal data processing of customers and employees. This is strictly regulated by legislation to protect the rights of the data subject. Enforcing regulation into enterpri... 详细信息
来源: 评论
POSTER: access control Model for the Hadoop Ecosystem  22
POSTER: Access Control Model for the Hadoop Ecosystem
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Patwa, Farhan Sandhu, Ravi UT San Antonio Dept Comp Sci Inst Cyber Secur One UTSA Circle San Antonio TX 78249 USA
Apache Hadoop is an important framework for fault-tolerant and distributed storage and processing of Big Data. Hadoop core platform along with other open-source tools such as Apache Hive, Storm, HBase offer an ecosyst... 详细信息
来源: 评论
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity control  22
Poster: On the Safety and Efficiency of Virtual Firewall Ela...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Li, Hongda Deng, Juan Hu, Hongxin Wang, Kuang-Ching Ahn, Gail-Joon Zhao, Ziming Han, Wonkyu Clemson Univ Clemson SC 29631 USA Arizona State Univ Tempe AZ 85287 USA
Firewalls have been typically used to enforce network access control. Network Functions Virtualization (NFV) envisions to implement firewall function as software instance (a.k.a virtual firewall). Virtual firewall pro... 详细信息
来源: 评论