咨询与建议

限定检索结果

文献类型

  • 452 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 378 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 78 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 8 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
  • 52 篇 管理学
    • 44 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 31 篇 理学
    • 29 篇 数学
    • 5 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 11 篇 法学
    • 9 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 161 篇 access control
  • 35 篇 security of data
  • 20 篇 security
  • 17 篇 rbac
  • 17 篇 privacy
  • 15 篇 attribute-based ...
  • 15 篇 authorization
  • 14 篇 role-based acces...
  • 12 篇 internet of thin...
  • 12 篇 xacml
  • 10 篇 relationship-bas...
  • 10 篇 usage control
  • 9 篇 abac
  • 9 篇 policy mining
  • 8 篇 xml
  • 8 篇 control system a...
  • 6 篇 role engineering
  • 6 篇 attributes
  • 5 篇 role based acces...
  • 4 篇 delegation

机构

  • 10 篇 purdue univ w la...
  • 6 篇 purdue universit...
  • 6 篇 eindhoven univ t...
  • 6 篇 suny albany alba...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 suny stony brook...
  • 4 篇 iit kharagpur kh...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 eindhoven univer...
  • 3 篇 university of pi...
  • 3 篇 univ calgary cal...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 rutgers state un...
  • 3 篇 national institu...
  • 3 篇 karlsruhe inst t...

作者

  • 23 篇 bertino elisa
  • 16 篇 sandhu ravi
  • 14 篇 ahn gail-joon
  • 10 篇 crampton jason
  • 10 篇 lobo jorge
  • 9 篇 li ninghui
  • 9 篇 ray indrakshi
  • 8 篇 zannone nicola
  • 8 篇 hu hongxin
  • 8 篇 jaeger trent
  • 7 篇 vaidya jaideep
  • 7 篇 elisa bertino
  • 7 篇 ferrari elena
  • 7 篇 xu dianxiang
  • 7 篇 iyer padmavathi
  • 6 篇 gupta maanak
  • 6 篇 masoumzadeh amir...
  • 6 篇 schaad andreas
  • 6 篇 tripunitara mahe...
  • 6 篇 ranise silvio

语言

  • 457 篇 英文
  • 1 篇 其他
检索条件"任意字段=Proceedings of Eighth ACM Symposium on Access Control Models and Technologies"
458 条 记 录,以下是61-70 订阅
排序:
Demo: Attribute-Stream-Based access control (ASBAC) with the Streaming Attribute Policy Language (SAPL)  21
Demo: Attribute-Stream-Based Access Control (ASBAC) with the...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Heutelbeck, Dominic FTK Forschungsinst Telekommunikat & Kooperat eV Dortmund Nrw Germany
Traditional Attribute-Based access control (ABAC) implementations are based on a request-response protocol resulting in one decision for one authorization request. In stateful, session-based applications this may lead... 详细信息
来源: 评论
Expressive Bilateral access control for Internet-of-Things in Cloud-Fog Computing  21
Expressive Bilateral Access Control for Internet-of-Things i...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Xu, Shengmin Ning, Jianting Ma, Jinhua Huang, Xinyi Pang, Hwee Hwa Deng, Robert H. Fujian Normal Univ Fuzhou Fujian Peoples R China Singapore Management Univ Singapore Singapore Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing 100093 Peoples R China
As a versatile system architecture, cloud-fog Internet-of-Things (IoT) enables multiple resource-constrained devices to communicate and collaborate with each other. By outsourcing local data and immigrating expensive ... 详细信息
来源: 评论
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing  21
Can I Reach You? Do I Need To? New Semantics in Security Pol...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Katsis, Charalampos Cicala, Fabrizio Thomsen, Dan Ringo, Nathan Bertino, Elisa Purdue Univ W Lafayette IN 47907 USA SIFT LLC Minneapolis MN USA
The zero trust principle only allows authorized and authenticated actions in a computer network. A network policy satisfies the least privilege principle by minimizing the network permissions to only those needed by u... 详细信息
来源: 评论
Network (In)security: Leniency in Protocols' Design, Code and Configuration  22
Network (In)security: Leniency in Protocols' Design, Code an...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Hoque, Endadul Syracuse Univ Syracuse NY 13210 USA
Protocols are one of the founding pillars of network communication. Given their importance, protocols have received great attention not only from the research community but also from adversaries. Protocols, particular... 详细信息
来源: 评论
Towards Activity-Centric access control for Smart Collaborative Ecosystems  21
Towards Activity-Centric Access Control for Smart Collaborat...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Sandhu, Ravi Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Univ Texas San Antonio Inst Cyber Secur San Antonio TX USA Univ Texas San Antonio NSF C SPECC Ctr Dept Comp Sci San Antonio TX USA
The ubiquitous presence of smart devices along with advancements in connectivity coupled with the elastic capabilities of cloud and edge systems have nurtured and revolutionized smart ecosystems. Intelligent, integrat... 详细信息
来源: 评论
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing  21
SCIFFS: Enabling Secure Third-Party Security Analytics using...
收藏 引用
26th acm symposium on access control models and technologies (SacmAT)
作者: Polinsky, Isaac Datta, Pubali Bates, Adam Enck, William N Carolina State Univ Raleigh NC 27695 USA Univ Illinois Champaign IL USA
Third-party security analytics allow companies to outsource threat monitoring tasks to teams of experts and avoid the costs of in-house security operations centers. By analyzing telemetry data from many clients these ... 详细信息
来源: 评论
DICE: Dynamic In-Situ control for Edge-based Applications  23
DICE: Dynamic In-Situ Control for Edge-based Applications
收藏 引用
proceedings of the eighth acm/IEEE symposium on Edge Computing
作者: Yongtao Yao Liping Julia Zhu Weisong Shi Computer & Information Sciences/The CAR Lab University of Delaware Newark Delaware USA Meta Platforms Inc. Menlo Park California USA
This paper focuses on addressing computational constraints and energy limitations prevalent in edge-based applications through an innovative approach, dynamic in-situ control for edge-based applications (DICE). DICE c... 详细信息
来源: 评论
Declarative access control for Aggregations of Multiple Ownership Data  20
Declarative Access Control for Aggregations of Multiple Owne...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Rosa, Marco Di Cerbo, Francesco Lozoya, Rocio Cabrera SAP Secur Res Sophia Antipolis France Univ Bergamo Sophia Antipolis France
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal fr... 详细信息
来源: 评论
Deploying access control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem  20
Deploying Access Control Enforcement for IoT in the Cloud-Ed...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Ahmad, Tahir Morelli, Umberto Ranise, Silvio FBK ICT Secur & Trust Unit Trento Italy Univ Genoa DIBRIS Genoa Italy
The CAP Theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it... 详细信息
来源: 评论
Active Learning of Relationship-Based access control Policies  20
Active Learning of Relationship-Based Access Control Policie...
收藏 引用
25th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Understanding access control policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced access control policy in a system is no... 详细信息
来源: 评论