咨询与建议

限定检索结果

文献类型

  • 47 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 40 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 5 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 20 篇 access control
  • 6 篇 attribute-based ...
  • 5 篇 internet of thin...
  • 5 篇 policy mining
  • 5 篇 xacml
  • 5 篇 security
  • 4 篇 abac
  • 4 篇 big data
  • 4 篇 privacy
  • 3 篇 risk
  • 2 篇 policy formalism
  • 2 篇 deep learning
  • 2 篇 context-aware ap...
  • 2 篇 object tags
  • 2 篇 data lake
  • 2 篇 fuzzy inference
  • 2 篇 access control p...
  • 2 篇 relationship-bas...
  • 2 篇 iot
  • 2 篇 role based

机构

  • 3 篇 purdue univ w la...
  • 2 篇 arizona state un...
  • 2 篇 clemson univ cle...
  • 2 篇 rutgers state un...
  • 2 篇 univ insubria di...
  • 2 篇 iit kharagpur kh...
  • 1 篇 penn state univ ...
  • 1 篇 quantitat sci so...
  • 1 篇 university of te...
  • 1 篇 iit kharagpur kh...
  • 1 篇 rutgers universi...
  • 1 篇 purdue universit...
  • 1 篇 postech pohang
  • 1 篇 eindhoven univer...
  • 1 篇 univ north texas...
  • 1 篇 univ texas san a...
  • 1 篇 univ chinese aca...
  • 1 篇 imperial coll en...
  • 1 篇 mitre corp burli...
  • 1 篇 nokia bell labs ...

作者

  • 3 篇 gupta maanak
  • 3 篇 bertino elisa
  • 3 篇 sandhu ravi
  • 2 篇 colombo pietro
  • 2 篇 zannone nicola
  • 2 篇 patwa farhan
  • 2 篇 takabi hassan
  • 2 篇 vaidya jaideep
  • 2 篇 atluri vijayalak...
  • 2 篇 crampton jason
  • 2 篇 hu hongxin
  • 2 篇 ferrari elena
  • 2 篇 ranise silvio
  • 2 篇 sural shamik
  • 2 篇 ahn gail-joon
  • 1 篇 doyle jon
  • 1 篇 kim jong
  • 1 篇 choi jiwon
  • 1 篇 han wonkyu
  • 1 篇 gautam mayank

语言

  • 47 篇 英文
检索条件"任意字段=Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"
47 条 记 录,以下是1-10 订阅
排序:
User interface models for the cloud  10
User interface models for the cloud
收藏 引用
Adjunct proceedings of the 23nd annual acm symposium on User interface software and technology
作者: Pham, Hubert MIT CSAIL 32 Vassar Street Cambridge MA 02139 United States
The current desktop metaphor is unsuitable for the coming age of cloud-based applications. The desktop was developed in an era that was focused on local resources, and consequently its gestures, semantics, and securit... 详细信息
来源: 评论
Poster: Constrained Policy Mining in Attribute Based access control  22
Poster: Constrained Policy Mining in Attribute Based Access ...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Gautam, Mayank Jha, Sadhana Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi IIT Kharagpur Kharagpur W Bengal India Rutgers State Univ New Brunswick NJ USA
In practical access control systems, it is important to enforce an upper bound on the time taken to respond to an access request. This response time is directly influenced by the size (often called the weight) of each... 详细信息
来源: 评论
access control in the Era of Big Data: State of the Art and Research Directions  18
Access Control in the Era of Big Data: State of the Art and ...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Colombo, Pietro Ferrari, Elena Univ Insubria DiSTA Varese Italy
Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a standard data model and related data manipulation language. In this paper, we fo... 详细信息
来源: 评论
access control Enforcement within MQTT-based Internet of Things Ecosystems  18
Access Control Enforcement within MQTT-based Internet of Thi...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Colombo, Pietro Ferrari, Elena Univ Insubria DiSTA Varese Italy
Confidentiality and privacy of data managed by IoT ecosystems is becoming a primary concern. This paper targets the design of a general access control enforcement mechanism for MQTT-based IoT ecosystems. The proposed ... 详细信息
来源: 评论
proceedings of Eighth acm symposium on access control models and technologies
Proceedings of Eighth ACM Symposium on Access Control Models...
收藏 引用
proceedings of Eighth acm symposium on access control models and technologies
The proceedings contains 23 papers. Topics discussed include enterprise role administration, contraints, role based access control for collaborative environments, access control models and mechanisms, role engineering... 详细信息
来源: 评论
Poster: Reactive access control Systems  23
Poster: Reactive Access Control Systems
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Davari, Maryam Bertino, Elisa Purdue Univ W Lafayette IN 47907 USA
In context-aware applications, user's access privileges rely on both user's identity and context. access control rules are usually statically defined while contexts and the system state can change dynamically.... 详细信息
来源: 评论
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems  22
Security Analysis and Legal Compliance Checking for the Desi...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Guarda, Paolo Ranise, Silvio Siswantoro, Hari Univ Trento Fac Law Trento Italy FBK Irst Secur & Trust Trento Italy Univ Trento DISI Trento Italy
Nowadays, most of business practices involve personal data processing of customers and employees. This is strictly regulated by legislation to protect the rights of the data subject. Enforcing regulation into enterpri... 详细信息
来源: 评论
Mining Relationship-Based access control Policies  22
Mining Relationship-Based Access Control Policies
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Thang Bui Stoller, Scott D. Li, Jiajie SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing. We formulate ReBAC as an object-oriented extension of attribute-based a... 详细信息
来源: 评论
POSTER: access control Model for the Hadoop Ecosystem  22
POSTER: Access Control Model for the Hadoop Ecosystem
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Patwa, Farhan Sandhu, Ravi UT San Antonio Dept Comp Sci Inst Cyber Secur One UTSA Circle San Antonio TX 78249 USA
Apache Hadoop is an important framework for fault-tolerant and distributed storage and processing of Big Data. Hadoop core platform along with other open-source tools such as Apache Hive, Storm, HBase offer an ecosyst... 详细信息
来源: 评论
Mining Positive and Negative Attribute-Based access control Policy Rules  18
Mining Positive and Negative Attribute-Based Access Control ...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Mining access control policies can reduce the burden of adopting more modern access control models by automating the process of generating policies based on existing authorization information in a system. Previous wor... 详细信息
来源: 评论