咨询与建议

限定检索结果

文献类型

  • 375 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 381 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 324 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 72 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 14 篇 电气工程
    • 9 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 交通运输工程
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 35 篇 管理学
    • 28 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 18 篇 理学
    • 15 篇 数学
    • 5 篇 统计学(可授理学、...
    • 3 篇 生物学
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 138 篇 access control
  • 15 篇 rbac
  • 14 篇 privacy
  • 14 篇 authorization
  • 12 篇 security
  • 11 篇 attribute-based ...
  • 10 篇 relationship-bas...
  • 9 篇 xacml
  • 9 篇 usage control
  • 8 篇 internet of thin...
  • 8 篇 role-based acces...
  • 8 篇 control system a...
  • 7 篇 abac
  • 6 篇 policy mining
  • 5 篇 attributes
  • 4 篇 xml
  • 4 篇 information flow...
  • 4 篇 policy enforceme...
  • 4 篇 activity-centric...
  • 4 篇 access control m...

机构

  • 7 篇 purdue univ w la...
  • 5 篇 suny stony brook...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 purdue univ dept...
  • 3 篇 univ waterloo wa...
  • 3 篇 department of co...
  • 3 篇 univ kent sch co...
  • 3 篇 swiss fed inst t...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 iit kharagpur kh...
  • 2 篇 univ trento dept...
  • 2 篇 univ. of texas d...
  • 2 篇 peking univ peop...

作者

  • 16 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 11 篇 ahn gail-joon
  • 10 篇 lobo jorge
  • 8 篇 li ninghui
  • 7 篇 crampton jason
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 vaidya jaideep
  • 6 篇 hu hongxin
  • 6 篇 tripunitara mahe...
  • 6 篇 stoller scott d.
  • 6 篇 iyer padmavathi
  • 5 篇 gupta maanak
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 molloy ian
  • 5 篇 kerschbaum flori...
  • 5 篇 ranise silvio
  • 5 篇 armando alessand...

语言

  • 379 篇 英文
  • 1 篇 葡萄牙文
  • 1 篇 其他
检索条件"任意字段=Proceedings of the 17th ACM symposium on Access Control Models and Technologies"
381 条 记 录,以下是21-30 订阅
排序:
Pairing Human and Artificial Intelligence: Enforcing access control Policies with LLMs and Formal Specifications  29
Pairing Human and Artificial Intelligence: Enforcing Access ...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Rubio-Medrano, Carlos E. Kotak, Akash Wang, Wenlu Sohr, Karsten Texas A&M Univ Corpus Christi Corpus Christi TX USA Univ Bremen Bremen Germany
Large Language models (LLMs), such as ChatGPT and Google Bard, have performed interestingly well when assisting developers on computer programming tasks, a.k.a., coding, thus potentially resulting in convenient and fa... 详细信息
来源: 评论
the Hardness of Learning access control Policies  23
The Hardness of Learning Access Control Policies
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Lei, Xiaomeng Tripunitara, Mahesh Univ Waterloo Waterloo ON Canada
the problem of learning access control policies is receiving increasing attention in research. We contribute to the foundations of this problem by posing and addressing meaningful questions on computational hardness. ... 详细信息
来源: 评论
Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes  29
Circles of Trust: A Voice-Based Authorization Scheme for Sec...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Mondragon, Jennifer Cruz, Gael Shastri, Dvijesh Rubio-Medrano, Carlos E. Texas A&M Univ Corpus Christi Corpus Christi TX 78412 USA Univ Houston Downtown Houston TX USA
Smart homes, powered by a plethora of Internet of things (IoT) devices, such as smart thermostats, lights, and TVs, have gained immense popularity due to their simple voice command control, making them user-friendly f... 详细信息
来源: 评论
Privacy-Preserving Multi-Party access control for third-Party UAV Services  23
Privacy-Preserving Multi-Party Access Control for Third-Part...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: George, Dominik Roy Sciancalepore, Savio Zannone, Nicola Eindhoven Univ Technol Eindhoven Netherlands
third-Party Unmanned Aerial Vehicle (UAV) Services, a.k.a. Drone-as-a-Service (DaaS), are an increasingly adopted business model, which enables possibly unskilled users, with no background knowledge, to operate drones... 详细信息
来源: 评论
Poster: Attribute Based access control for IoT Devices in 5G Networks  23
Poster: Attribute Based Access Control for IoT Devices in 5G...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Kaven, Sascha Skwarek, Volker Hamburg Univ Appl Sci Res & Transfer Ctr CyberSec Hamburg Germany
the deployment of 5G technology has the potential to usher in a new era for the internet of things (IoT). the introduction of new use cases, such as massive machine-type communications (mMTC), referring to a large num... 详细信息
来源: 评论
Static and Dynamic Analysis of a Usage control System  29
Static and Dynamic Analysis of a Usage Control System
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Schopp, Ulrich Faghih, Fathiyeh Bandopadhyay, Subhajit Joumaa, Hussein Ibrahim, Amjad Xu, Chuangjie Ye, Xin Dimitrakos, theo Fortiss GmbH Munich Germany Huawei Technol Dusseldorf Munich Germany City Univ London London England Univ Trento Trento Italy Univ Kent Canterbury Kent England
the ability to exchange data while maintaining sovereignty is fundamental to emerging decentralized data-driven ecosystems. Data sovereignty refers to the entity's capability to be self-determined concerning data ... 详细信息
来源: 评论
Specifying a Usage control System  23
Specifying a Usage Control System
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Schoepp, Ulrich Xu, Chuangjie Ibrahim, Amjad Faghih, Fathiyeh Dimitrakos, theo Fortiss GmbH Res Inst Free State Bavaria Munich Germany Huawei Technol Dusseldorf GmbH German Res Ctr Munich Germany Univ Kent Sch Comp Canterbury Kent England
Modern system architectures require sophisticated access and usage control mechanisms. the need stems from demanding requirements for security, data sovereignty and privacy regulations, as well as the challenges prese... 详细信息
来源: 评论
Synthesizing and Analyzing Attribute-Based access control Model Generated from Natural Language Policy Statements  23
Synthesizing and Analyzing Attribute-Based Access Control Mo...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Abdelgawad, Mahmoud Ray, Indrakshi Alqurashi, Saja Venkatesha, Videep Shirazi, Hosein Colorado State Univ Dept Comp Sci Ft Collins CO 80523 USA San Diego State Univ Management Informat Syst San Diego CA 92182 USA
access control policies (ACPs) are natural language statements that describe criteria under which users can access resources. We focus on constructing NIST Next Generation access control (NGAC) ABAC model from ACP sta... 详细信息
来源: 评论
A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based access control  23
A Framework for Privacy-Preserving White-Box Anomaly Detecti...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Leite, Cristoffer den Hartog, Jerry Koster, Paul Eindhoven Univ Technol Eindhoven Netherlands Philips Res Eindhoven Netherlands
Privacy concerns are amongst the core issues that will constrain the adoption of distributed anomaly detection. Indeed, when outsourcing anomaly detection, i.e. with a party other than the data owner running the detec... 详细信息
来源: 评论
ProgramAlly: Creating Custom Visual access Programs via Multi-Modal End-User Programming  24
ProgramAlly: Creating Custom Visual Access Programs via Mult...
收藏 引用
37th acm Annual symposium on User Interface Software and Technology (UIST)
作者: Herskovitz, Jaylin Xu, Andi Alharbi, Rahaf Guo, Anhong Univ Michigan Ann Arbor MI 48109 USA
Existing visual assistive technologies are built for simple and common use cases, and have few avenues for blind people to customize their functionalities. Drawing from prior work on DIY assistive technology, this pap... 详细信息
来源: 评论