咨询与建议

限定检索结果

文献类型

  • 362 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 321 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 77 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 13 篇 安全科学与工程
    • 10 篇 电气工程
    • 6 篇 交通运输工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
  • 34 篇 管理学
    • 30 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 20 篇 理学
    • 15 篇 数学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
  • 9 篇 法学
    • 9 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 134 篇 access control
  • 17 篇 security
  • 16 篇 rbac
  • 13 篇 authorization
  • 12 篇 privacy
  • 9 篇 attribute-based ...
  • 8 篇 role-based acces...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 internet of thin...
  • 5 篇 abac
  • 5 篇 xml
  • 4 篇 policy mining
  • 4 篇 information flow...
  • 4 篇 policy enforceme...
  • 4 篇 security of data
  • 4 篇 activity-centric...
  • 4 篇 access control m...

机构

  • 7 篇 purdue univ w la...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 univ n carolina ...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...
  • 2 篇 university of lu...

作者

  • 16 篇 bertino elisa
  • 15 篇 crampton jason
  • 9 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 8 篇 li ninghui
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 kerschbaum flori...
  • 5 篇 armando alessand...
  • 5 篇 thuraisingham bh...
  • 5 篇 stoller scott d.
  • 5 篇 hartenstein hann...

语言

  • 367 篇 英文
  • 3 篇 其他
检索条件"任意字段=Proceedings of the 20th ACM Symposium on Access Control Models and Technologies"
370 条 记 录,以下是1-10 订阅
排序:
SacmAT 2024 - proceedings of the 29th acm symposium on access control models and technologies
SACMAT 2024 - Proceedings of the 29th ACM Symposium on Acces...
收藏 引用
29th acm symposium on access control models and technologies, SacmAT 2024
the proceedings contain 20 papers. the topics discussed include: ToneCheck: unveiling the impact of dialects in privacy policy;make split, not hijack: preventing feature-space hijacking attacks in split learning;makin...
来源: 评论
SacmAT 2023 - proceedings of the 28th acm symposium on access control models and technologies
SACMAT 2023 - Proceedings of the 28th ACM Symposium on Acces...
收藏 引用
28th acm symposium on access control models and technologies, SacmAT 2023
the proceedings contain 25 papers. the topics discussed include: access control vulnerabilities in network protocol implementations: how attackers exploit them and what to do about it;a framework for privacy-preservin...
来源: 评论
SacmAT 2022 - proceedings of the 27th acm symposium on access control models and technologies
SACMAT 2022 - Proceedings of the 27th ACM Symposium on Acces...
收藏 引用
27th acm symposium on access control models and technologies, SacmAT 2022
the proceedings contain 29 papers. the topics discussed include: modular composition of access control policies: a framework to build multi-site multi-level combinations;a study of application sandbox policies in Linu...
来源: 评论
SacmAT 2021 - proceedings of the 26th acm symposium on access control models and technologies
SACMAT 2021 - Proceedings of the 26th ACM Symposium on Acces...
收藏 引用
26th acm symposium on access control models and technologies, SacmAT 2021
the proceedings contain 19 papers. the topics discussed include: backdoor attacks to graph neural networks;analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research;towards a theory for sem...
来源: 评论
SacmAT 2020 - proceedings of the 25th acm symposium on access control models and technologies
SACMAT 2020 - Proceedings of the 25th ACM Symposium on Acces...
收藏 引用
25th acm symposium on access control models and technologies, SacmAT 2020
the proceedings contain 24 papers. the topics discussed include: metering graphical data leakage with snowman;visualizing and interpreting RNN models in URL-based phishing detection;parallel space traveling: a securit...
来源: 评论
Cryptographic Enforcement of access control Policies: models, Applications, and Future Directions  29
Cryptographic Enforcement of Access Control Policies: Models...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Masucci, Barbara Univ Salerno Dept Comp Sci Fisciano Italy
Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements. Among the different techniques ... 详细信息
来源: 评论
the Category-Based Approach to access control, Obligations and Privacy  23
The Category-Based Approach to Access Control, Obligations a...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Fernandez, Maribel Kings Coll London London England
the category-based access control metamodel provides an axiomatic framework for the specification of access control models. In this talk, we give an overview of the category-based approach to access control, obligatio... 详细信息
来源: 评论
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots  29
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Hemken, Niklas Jacob, Florian Teernava, Fabian Kartmann, Rainer Asfour, Tamim Hartenstein, Hannes Karlsruhe Inst Technol Karlsruhe Germany
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they als... 详细信息
来源: 评论
A Bargaining-Game Framework for Multi-Party access control  29
A Bargaining-Game Framework for Multi-Party Access Control
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Mehri, Gelareh Hasel Monmege, Benjamin Bertolissi, Clara Zannone, Nicola Eindhoven Univ Technol Eindhoven Netherlands Aix Marseille Univ CNRS LIS Marseille France
Multi-party access control is emerging to protect shared resources in collaborative environments. Existing multi-party access control models often lack essential features to address the challenges characterizing colla... 详细信息
来源: 评论
Converting Rule-Based access control Policies: From Complemented Conditions to Deny Rules  29
Converting Rule-Based Access Control Policies: From Compleme...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Ruiz, Josue A. Narendran, Paliath Masoumzadeh, Amir Iyer, Padmavathi SUNY Albany Univ Albany Albany NY 12246 USA Drury Univ Springfield MO USA
Using access control policy rules with deny effects (i.e., negative authorization) can be preferred to using complemented conditions in the rules as they are often easier to comprehend in the context of large policies... 详细信息
来源: 评论