咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是51-60 订阅
排序:
BlueSky: Activity control: A Vision for "Active" Security models for Smart Collaborative Systems  22
BlueSky: Activity Control: A Vision for "Active" Security Mo...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Mawla, Tanjila Gupta, Maanak Sandhu, Ravi Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Univ Texas San Antonio Inst Cyber Secur ICS San Antonio TX USA Univ Texas San Antonio NSF C SPECC Ctr San Antonio TX USA
Cyber physical ecosystem connects different intelligent devices over heterogeneous networks. Various operations are performed on smart objects to ensure efficiency and to support automation in smart environments. An A... 详细信息
来源: 评论
WebSheets: A New Privacy-Centric Framework for Web Applications  23
WebSheets: A New Privacy-Centric Framework for Web Applicati...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Stoller, Scott D. SUNY Stony Brook Stony Brook NY 11794 USA
Spreadsheets are enormously popular because they enable non-programmers to create applications that manipulate tabular data. The core functionality of many web applications is to display and manipulate tabular data, t... 详细信息
来源: 评论
BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems  22
BlueSky: Towards Convergence of Zero Trust Principles and Sc...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Ameer, Safwa Gupta, Maanak Bhatt, Smriti Sandhu, Ravi Univ Texas San Antonio Inst Cyber Secur San Antonio TX 78249 USA Univ Texas San Antonio NSF C SPECC Ctr Dept Comp Sci San Antonio TX 78249 USA Tennessee Technol Univ Cookeville TN 38505 USA Purdue Univ W Lafayette IN 47907 USA
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. It assumes no implicit trust is granted to ... 详细信息
来源: 评论
Poster: Towards Cloud-Based Software for Incorporating Time and Location into access control Decisions  21
Poster: Towards Cloud-Based Software for Incorporating Time ...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Al Lail, Mustafa Texas A&M Int Univ Laredo TX 78041 USA
The increasing dependency on cloud computing has drawn attention to the security weaknesses of cloud providers. Not only how information is accessed, but also where and when have become important considerations in clo... 详细信息
来源: 评论
Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based access control models  21
Towards a Theory for Semantics and Expressiveness Analysis o...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Masoumzadeh, Amirreza Narendran, Paliath Iyer, Padmavathi Univ Albany SUNY Albany NY 12222 USA
Recent access control models such as attribute-based access control and relationship-based access control allow flexible expression of authorization policies using the concepts of rules and conditional expressions. Th... 详细信息
来源: 评论
Towards Unifying RBAC with Information Flow control  21
Towards Unifying RBAC with Information Flow Control
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Radhika, B. S. Kumar, Narendra N., V Shyamasundar, R. K. Indian Inst Technol Bombay 400076 Maharashtra India Inst Dev & Res Banking Technol Hyderabad 500057 India
Role-based access control (RBAC) is one of the most widely implemented access control models. In today's complex computing systems, one of the increasingly sought-after features for reliable security is informatio... 详细信息
来源: 评论
In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based access control  21
In-Memory Policy Indexing for Policy Retrieval Points in Att...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Heutelbeck, Dominic Baur, Marc Lucas Kluba, Martin FTK Forschungsinst Telekommunikat & Kooperat eV Dortmund Germany
Attribute-Based access control (ABAC) systems are using machine-readable rules for making access control decisions. Rules are collected in documents, the named policies, or policy sets. These are expressed in a specif... 详细信息
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
24th acm symposium on access control models and technologies, SacmAT 2019
The proceedings contain 27 papers. The topics discussed include: access control for binary integrity protection using ethereum;FriendGuard: a friend search engine with guaranteed friend exposure degree;brokering polic...
来源: 评论
Mutation Analysis of NGAC Policies  21
Mutation Analysis of NGAC Policies
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Chen, Erzhuo Dubrovenski, Vladislav Xu, Dianxiang Univ Missouri Kansas City Dept Comp Sci Elect Engn Kansas City MO 64110 USA
The NGAC (Next Generation access control) standard for attribute-based access control (ABAC) allows for run-time changes of the permission and prohibition configurations through administrative obligations triggered by... 详细信息
来源: 评论
Towards Correct Smart Contracts: A Case Study on Formal Verification of access control  21
Towards Correct Smart Contracts: A Case Study on Formal Veri...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Schiffl, Jonas Grundmann, Matthias Leinweber, Marc Stengele, Oliver Friebe, Sebastian Beckert, Bernhard Karlsruhe Inst Technol Inst Informat Secur & Dependabil KASTEL Karlsruhe Germany Karlsruhe Inst Technol Inst Telemat Karlsruhe Germany
Ethereum is a platform for deploying smart contracts, which due to their public nature and the financial value of the assets they manage are attractive targets for attacks. With asset management as a main task of smar... 详细信息
来源: 评论