咨询与建议

限定检索结果

文献类型

  • 375 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 381 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 324 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 72 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 14 篇 电气工程
    • 9 篇 安全科学与工程
    • 3 篇 机械工程
    • 3 篇 交通运输工程
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 35 篇 管理学
    • 28 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 18 篇 理学
    • 15 篇 数学
    • 5 篇 统计学(可授理学、...
    • 3 篇 生物学
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 138 篇 access control
  • 15 篇 rbac
  • 14 篇 privacy
  • 14 篇 authorization
  • 12 篇 security
  • 11 篇 attribute-based ...
  • 10 篇 relationship-bas...
  • 9 篇 xacml
  • 9 篇 usage control
  • 8 篇 internet of thin...
  • 8 篇 role-based acces...
  • 8 篇 control system a...
  • 7 篇 abac
  • 6 篇 policy mining
  • 5 篇 attributes
  • 4 篇 xml
  • 4 篇 information flow...
  • 4 篇 policy enforceme...
  • 4 篇 activity-centric...
  • 4 篇 access control m...

机构

  • 7 篇 purdue univ w la...
  • 5 篇 suny stony brook...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 arizona state un...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 purdue univ dept...
  • 3 篇 univ waterloo wa...
  • 3 篇 department of co...
  • 3 篇 univ kent sch co...
  • 3 篇 swiss fed inst t...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 iit kharagpur kh...
  • 2 篇 univ trento dept...
  • 2 篇 univ. of texas d...
  • 2 篇 peking univ peop...

作者

  • 16 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 11 篇 ahn gail-joon
  • 10 篇 lobo jorge
  • 8 篇 li ninghui
  • 7 篇 crampton jason
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 vaidya jaideep
  • 6 篇 hu hongxin
  • 6 篇 tripunitara mahe...
  • 6 篇 stoller scott d.
  • 6 篇 iyer padmavathi
  • 5 篇 gupta maanak
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 molloy ian
  • 5 篇 kerschbaum flori...
  • 5 篇 ranise silvio
  • 5 篇 armando alessand...

语言

  • 379 篇 英文
  • 1 篇 葡萄牙文
  • 1 篇 其他
检索条件"任意字段=Proceedings of the 17th ACM symposium on Access Control Models and Technologies"
381 条 记 录,以下是41-50 订阅
排序:
Modular Composition of access control Policies: A Framework to Build Multi-Site Multi-Level Combinations  22
Modular Composition of Access Control Policies: A Framework ...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Bertolissi, Clara Fernandez, Maribel Univ Aix Marseille CNRS UMR 7020 Marseille France Kings Coll London London England
We present general notions of access control policy composition using the CBAC model. We show that CBAC provides a uniform framework to define compositions of heterogeneous policies (e.g., RBAC and ABAC policies) as r... 详细信息
来源: 评论
WiP: AABAC - Automated Attribute Based access control for Genomics Data  22
WiP: AABAC - Automated Attribute Based Access Control for Ge...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Reddick, David Presley, Justin Feltus, Frank Alex Shannigrahi, Susmit Tennessee Technol Univ Cookeville TN 38505 USA Clemson Univ Clemson SC USA
the COVID-19 crisis and the subsequent vaccine development have demonstrated the potential of cutting-edge genomics research. However, the privacy of these sensitive pieces of information is an area of significant con... 详细信息
来源: 评论
Verifying vMVCC, a high-performance transaction library using multi-version concurrency control  17
Verifying vMVCC, a high-performance transaction library usin...
收藏 引用
17th USENIX symposium on Operating Systems Design and Implementation (OSDI)
作者: Chang, Yun-Sheng Jung, Ralf Sharma, Upamanyu Tassarotti, Joseph Kaashoek, M. Frans Zeldovich, Nickolai MIT CSAIL Cambridge MA USA Swiss Fed Inst Technol Zurich Switzerland New York Univ New York NY USA
Multi-version concurrency control (MVCC) is a widely used, sophisticated approach for handling concurrent transactions. vMVCC is the first MVCC-based transaction library that comes with a machine-checked proof of corr... 详细信息
来源: 评论
17th International Conference on Graph Transformation, ICGT 2024, held as Part of Software technologies: Applications and Foundations, STAF 2024
17th International Conference on Graph Transformation, ICGT ...
收藏 引用
17th International Conference on Graph Transformation, ICGT 2024, held as Part of Software technologies: Applications and Foundations, STAF 2024
the proceedings contain 13 papers. the special focus in this conference is on Graph Transformation. the topics include: Generalized Weighted Type Graphs for Termination of Graph Transformation Systems;extens...
来源: 评论
BlueSky: Activity control: A Vision for "Active" Security models for Smart Collaborative Systems  22
BlueSky: Activity Control: A Vision for "Active" Security Mo...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Mawla, Tanjila Gupta, Maanak Sandhu, Ravi Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Univ Texas San Antonio Inst Cyber Secur ICS San Antonio TX USA Univ Texas San Antonio NSF C SPECC Ctr San Antonio TX USA
Cyber physical ecosystem connects different intelligent devices over heterogeneous networks. Various operations are performed on smart objects to ensure efficiency and to support automation in smart environments. An A... 详细信息
来源: 评论
Higher-Order Relationship-Based access control: A Temporal Instantiation with IoT Applications  22
Higher-Order Relationship-Based Access Control: A Temporal I...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Arora, Chahal Rizvi, Syed Zain R. Fong, Philip W. L. Univ Calgary Calgary AB Canada
Cyberphysical systems involve connected devices that are physically embedded. these devices enter into transient relationships with one another and with the environment. We propose an access control model, HO(T)-ReBAC... 详细信息
来源: 评论
Poster: Toward Zero-Trust Path-Aware access control  22
Poster: Toward Zero-Trust Path-Aware Access Control
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Seaton, Joshua H. Hounsinou, Sena Wood, Timothy Xu, Shouhuai Brown, Philip N. Bloom, Gedare Univ Colorado Colorado Springs Colorado Springs CO 80918 USA George Washington Univ Washington DC USA
In this poster, we introduce path-aware risk scores for access control (PARSAC), a novel context-sensitive technique to enrich access requests with risk scoring of the path taken by those requests between the authenti... 详细信息
来源: 评论
Modeling and Analysis of Latencies in Multi-User, Multi-RAT Edge Computing  19
Modeling and Analysis of Latencies in Multi-User, Multi-RAT ...
收藏 引用
19th acm International symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet)
作者: Balaji, Rushabha Mehta, Neelesh B. Singh, Chandramani Univ Calif San Diego Elect & Comp Engn La Jolla CA 92093 USA Indian Inst Sci ECE Bengaluru India Indian Inst Sci Elect Syst Engn Bengaluru India
Multi-access edge computing enables resource-constrained handsets to offload their tasks to edge servers through multiple radio access technologies (RATs). However, RATs such as cellular and wireless local area networ... 详细信息
来源: 评论
WiP: Metamodel for Continuous Authorisation and Usage control  22
WiP: Metamodel for Continuous Authorisation and Usage Contro...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Hariri, Ali Ibrahim, Amjad Dimitrakos, theo Crispo, Bruno Huawei Technol Duesseldorf GmbH German Res Ctr Munich Germany Univ Trento Dept Informat Engn & Comp Sci Trento Italy Univ Kent Sch Comp Canterbury Kent England
access control has been traditionally used to protect data and privacy. Traditional access control models (e.g., ABAC, RBAC) cannot meet modern security requirements as technologies spread over heterogeneous and dynam... 详细信息
来源: 评论
Effective Evaluation of Relationship-Based access control Policy Mining  22
Effective Evaluation of Relationship-Based Access Control Po...
收藏 引用
27th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Mining algorithms for relationship-based access control policies produce policies composed of relationship-based patterns that justify the input authorizations according to a given system graph. the correct functionin... 详细信息
来源: 评论