咨询与建议

限定检索结果

文献类型

  • 362 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 321 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 77 篇 控制科学与工程
    • 25 篇 信息与通信工程
    • 13 篇 安全科学与工程
    • 10 篇 电气工程
    • 6 篇 交通运输工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 光学工程
  • 34 篇 管理学
    • 30 篇 图书情报与档案管...
    • 11 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 20 篇 理学
    • 15 篇 数学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
  • 9 篇 法学
    • 9 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 134 篇 access control
  • 17 篇 security
  • 16 篇 rbac
  • 13 篇 authorization
  • 12 篇 privacy
  • 9 篇 attribute-based ...
  • 8 篇 role-based acces...
  • 8 篇 xacml
  • 8 篇 relationship-bas...
  • 8 篇 control system a...
  • 8 篇 usage control
  • 7 篇 internet of thin...
  • 5 篇 abac
  • 5 篇 xml
  • 4 篇 policy mining
  • 4 篇 information flow...
  • 4 篇 policy enforceme...
  • 4 篇 security of data
  • 4 篇 activity-centric...
  • 4 篇 access control m...

机构

  • 7 篇 purdue univ w la...
  • 5 篇 eindhoven univ t...
  • 5 篇 suny albany alba...
  • 4 篇 purdue universit...
  • 4 篇 univ texas dalla...
  • 4 篇 univ genoa dibri...
  • 4 篇 carnegie mellon ...
  • 4 篇 purdue univ dept...
  • 3 篇 univ kent sch co...
  • 3 篇 univ n carolina ...
  • 3 篇 karlsruhe inst t...
  • 3 篇 kings coll londo...
  • 3 篇 suny stony brook...
  • 2 篇 univ waterloo wa...
  • 2 篇 univ trento dept...
  • 2 篇 univ. of texas d...
  • 2 篇 department of co...
  • 2 篇 university of so...
  • 2 篇 colorado state u...
  • 2 篇 university of lu...

作者

  • 16 篇 bertino elisa
  • 15 篇 crampton jason
  • 9 篇 lobo jorge
  • 9 篇 sandhu ravi
  • 9 篇 ahn gail-joon
  • 8 篇 li ninghui
  • 7 篇 ray indrakshi
  • 6 篇 zannone nicola
  • 6 篇 tripunitara mahe...
  • 6 篇 iyer padmavathi
  • 5 篇 masoumzadeh amir...
  • 5 篇 rubio-medrano ca...
  • 5 篇 vaidya jaideep
  • 5 篇 molloy ian
  • 5 篇 beznosov konstan...
  • 5 篇 kerschbaum flori...
  • 5 篇 armando alessand...
  • 5 篇 thuraisingham bh...
  • 5 篇 stoller scott d.
  • 5 篇 hartenstein hann...

语言

  • 367 篇 英文
  • 3 篇 其他
检索条件"任意字段=Proceedings of the 20th ACM Symposium on Access Control Models and Technologies"
370 条 记 录,以下是11-20 订阅
排序:
A Self-Sovereign Identity Approach to Decentralized access control with Transitive Delegations  29
A Self-Sovereign Identity Approach to Decentralized Access C...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Vrielynck, Pieter-Jan Van hamme, Tim Ghostin, Rawad Lagaisse, Bert Preuveneers, Davy Joosen, Wouter Katholieke Univ Leuven DistriNet B-3001 Leuven Belgium
In this paper, we introduce a new decentralized access control framework with transitive delegation capabilities that tackles the performance and scalability limitations of the existing state-of-the-art solutions. In ... 详细信息
来源: 评论
Hierarchical Key Assignment Schemes with Key Rotation  29
Hierarchical Key Assignment Schemes with Key Rotation
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Belfiore, Roberta Cimorelli De Santis, Alfredo Ferrara, Anna Lisa Masucci, Barbara Univ Molise Dept Biosci Div Comp Sci Campobasso Italy Univ Salerno Dept Comp Sci Fisciano Italy
Hierarchical structures are frequently used to manage access to sensitive data in various contexts, ranging from organizational settings to IoT networks. A Hierarchical Key Assignment Scheme (HKAS) is designed to cryp... 详细信息
来源: 评论
Poster: How to Raise a Robot - Beyond access control Constraints in Assistive Humanoid Robots  23
Poster: How to Raise a Robot - Beyond Access Control Constra...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Hemken, Niklas Jacob, Florian Peller-Konrad, Fabian Kartmann, Rainer Asfour, Tamim Hartenstein, Hannes KIT Karlsruhe Germany
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they als... 详细信息
来源: 评论
Obligation Management Framework for Usage control  29
Obligation Management Framework for Usage Control
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Joumaa, Hussein Hariri, Ali Petrovska, Ana Osliak, Oleksii Dimitrakos, theo Crispo, Bruno Univ Trento Dept Informat Engn & Comp Sci Trento Italy Huawei Technol Duesseldorf GmbH Munich Germany Univ Kent Sch Comp Canterbury Kent England
Obligations were introduced in access and usage control as a mechanism to specify mandatory actions to be fulfilled as part of authorization. In this paper, we address challenges related to obligation management in ac... 详细信息
来源: 评论
Towards Automated Learning of access control Policies Enforced by Web Applications  23
Towards Automated Learning of Access Control Policies Enforc...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amir SUNY Albany Albany NY 12222 USA
Obtaining an accurate specification of the access control policy enforced by an application is essential in ensuring that it meets our security/privacy expectations. this is especially important as many of real-world ... 详细信息
来源: 评论
Poster: Integrating Spatio-temporal Authorization With Generic Cloud-based Software Architecture for Internet Of things Devices  23
Poster: Integrating Spatio-temporal Authorization With Gener...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Moncivais, Marshal Al Lail, Mustafa Texas A&M Int Univ Laredo TX 78041 USA
the significant rise in the usage of IoT devices and their security issues has created a demand for improved security for these systems. Unfortunately, no standard IoT architecture exists, making the development of se... 详细信息
来源: 评论
Security Analysis of access control Policies for Smart Homes  23
Security Analysis of Access Control Policies for Smart Homes
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Belfiore, Roberta Cimorelli Ferrara, Anna Lisa Univ Molise Campobasso Italy
Ensuring security is crucial in smart home settings, where only authorized users should have access to home devices. Over the past decade, researchers have focused on developing access control policies and evaluating ... 详细信息
来源: 评论
SecureCheck: User-Centric and Geolocation-Aware access Mediation Contracts for Sharing Private Data  29
SecureCheck: User-Centric and Geolocation-Aware Access Media...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Hopkins, Jacob Rubio-Medrano, Carlos Texas A&M Univ Corpus Christi Corpus Christi TX USA
Data oversharing is a critical issue in today's technologically driven society. Numerous entities, i.e., corporations, governments, criminal groups, are collecting individuals' data. One potential cause is tha... 详细信息
来源: 评论
Prompting LLM to Enforce and Validate CIS Critical Security control  29
Prompting LLM to Enforce and Validate CIS Critical Security ...
收藏 引用
29th acm symposium on access control models and technologies (SacmAT)
作者: Ahmed, Mohiuddin Wei, Jinpeng Al-Shaer, Ehab Univ North Carolina Charlotte Software & Informat Syst Charlotte NC 28223 USA Carnegie Mellon Univ Sch Comp Sci Pittsburgh PA 15213 USA
Proper security control enforcement reduces the attack surface and protects the organizations against attacks. Organizations like NIST and CIS (Center for Internet Security) provide critical security controls (CSCs) a... 详细信息
来源: 评论
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy  23
MSNetViews: Geographically Distributed Management of Enterpr...
收藏 引用
28th acm symposium on access control models and technologies (SacmAT)
作者: Anjum, Iffat Sokal, Jessica Rehman, Hafiza Ramzah Weintraub, Ben Leba, Ethan Enck, William Nita-Rotaru, Cristina Reaves, Bradley NC State Univ Raleigh NC 27695 USA Northeastern Univ Boston MA 02115 USA
Commercially-available software defined networking (SDN) technologies will play an important role in protecting the on-premises resources that remain as enterprises transition to zero trust architectures. However, exi... 详细信息
来源: 评论