咨询与建议

限定检索结果

文献类型

  • 47 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 40 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 5 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 20 篇 access control
  • 6 篇 attribute-based ...
  • 5 篇 internet of thin...
  • 5 篇 policy mining
  • 5 篇 xacml
  • 5 篇 security
  • 4 篇 abac
  • 4 篇 big data
  • 4 篇 privacy
  • 3 篇 risk
  • 2 篇 policy formalism
  • 2 篇 deep learning
  • 2 篇 context-aware ap...
  • 2 篇 object tags
  • 2 篇 data lake
  • 2 篇 fuzzy inference
  • 2 篇 access control p...
  • 2 篇 relationship-bas...
  • 2 篇 iot
  • 2 篇 role based

机构

  • 3 篇 purdue univ w la...
  • 2 篇 arizona state un...
  • 2 篇 clemson univ cle...
  • 2 篇 rutgers state un...
  • 2 篇 univ insubria di...
  • 2 篇 iit kharagpur kh...
  • 1 篇 penn state univ ...
  • 1 篇 quantitat sci so...
  • 1 篇 university of te...
  • 1 篇 iit kharagpur kh...
  • 1 篇 rutgers universi...
  • 1 篇 purdue universit...
  • 1 篇 postech pohang
  • 1 篇 eindhoven univer...
  • 1 篇 univ north texas...
  • 1 篇 univ texas san a...
  • 1 篇 univ chinese aca...
  • 1 篇 imperial coll en...
  • 1 篇 mitre corp burli...
  • 1 篇 nokia bell labs ...

作者

  • 3 篇 gupta maanak
  • 3 篇 bertino elisa
  • 3 篇 sandhu ravi
  • 2 篇 colombo pietro
  • 2 篇 zannone nicola
  • 2 篇 patwa farhan
  • 2 篇 takabi hassan
  • 2 篇 vaidya jaideep
  • 2 篇 atluri vijayalak...
  • 2 篇 crampton jason
  • 2 篇 hu hongxin
  • 2 篇 ferrari elena
  • 2 篇 ranise silvio
  • 2 篇 sural shamik
  • 2 篇 ahn gail-joon
  • 1 篇 doyle jon
  • 1 篇 kim jong
  • 1 篇 choi jiwon
  • 1 篇 han wonkyu
  • 1 篇 gautam mayank

语言

  • 47 篇 英文
检索条件"任意字段=Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"
47 条 记 录,以下是1-10 订阅
排序:
access control in the Era of Big Data: State of the Art and Research Directions  18
Access Control in the Era of Big Data: State of the Art and ...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Colombo, Pietro Ferrari, Elena Univ Insubria DiSTA Varese Italy
Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a standard data model and related data manipulation language. In this paper, we fo... 详细信息
来源: 评论
access control Enforcement within MQTT-based Internet of Things Ecosystems  18
Access Control Enforcement within MQTT-based Internet of Thi...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Colombo, Pietro Ferrari, Elena Univ Insubria DiSTA Varese Italy
Confidentiality and privacy of data managed by IoT ecosystems is becoming a primary concern. This paper targets the design of a general access control enforcement mechanism for MQTT-based IoT ecosystems. The proposed ... 详细信息
来源: 评论
Poster: Reactive access control Systems  23
Poster: Reactive Access Control Systems
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Davari, Maryam Bertino, Elisa Purdue Univ W Lafayette IN 47907 USA
In context-aware applications, user's access privileges rely on both user's identity and context. access control rules are usually statically defined while contexts and the system state can change dynamically.... 详细信息
来源: 评论
Mining Positive and Negative Attribute-Based access control Policy Rules  18
Mining Positive and Negative Attribute-Based Access Control ...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Iyer, Padmavathi Masoumzadeh, Amirreza SUNY Albany Albany NY 12222 USA
Mining access control policies can reduce the burden of adopting more modern access control models by automating the process of generating policies based on existing authorization information in a system. Previous wor... 详细信息
来源: 评论
Poster: Using Gini Impurity to Mine Attribute-based access control Policies with Environment Attributes  23
Poster: Using Gini Impurity to Mine Attribute-based Access C...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Das, Saptarshi Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi IIT Kharagpur Kharagpur W Bengal India Rutgers State Univ New Brunswick NJ USA
In Attribute-based access control (ABAC) systems, utilizing environment attributes along with the subject and object attributes introduces a dynamic nature to the access decisions. The inclusion of environment attribu... 详细信息
来源: 评论
Self-Generation of access control Policies  18
Self-Generation of Access Control Policies
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Calo, Seraphin Verma, Dinesh Chakraborty, Supriyo Bertino, Elisa Lupu, Emil Cirincione, Gregory IBM Res Yorktown Hts NY 10598 USA Purdue Univ W Lafayette IN 47907 USA Imperial Coll London England Army Res Labs Adelphi MD USA
access control for information has primarily focused on access statically granted to subjects by administrators usually in the context of a specific system. Even if mechanisms are available for access revocation, revo... 详细信息
来源: 评论
Multi-Party access control: Requirements, State of the Art and Open Challenges  18
Multi-Party Access Control: Requirements, State of the Art a...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Squicciarini, Anna Cinzia Rajtmajer, Sarah Michele Zannone, Nicola Penn State Univ University Pk PA 16802 USA Quantitat Sci Solut Arlington VA USA Eindhoven Univ Technol Eindhoven Netherlands
Multi-party access control is gaining attention and prominence within the community, as access control models and systems are faced with complex, jointly-owned and jointly-managed content. Traditional single-user appr... 详细信息
来源: 评论
HCAP: A History-Based Capability System for IoT Devices  18
HCAP: A History-Based Capability System for IoT Devices
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Tandon, Lakshya Fong, Philip W. L. Safavi-Naini, Reihaneh Univ Calgary Calgary AB Canada
Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constrain... 详细信息
来源: 评论
Privacy-Aware Risk-Adaptive access control in Health Information Systems using Topic models  18
Privacy-Aware Risk-Adaptive Access Control in Health Informa...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Zhang, Wenxi Li, Hao Zhang, Min Lv, Zhiquan Chinese Acad Sci Inst Software Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China Coordinat Ctr China Natl Comp Network Emergency Response Tech Team Beijing Peoples R China
Traditional role-based access control fails to meet the privacy requirements for patient data in medical systems, as it is infeasible for policy makers to foresee what information doctors may need for diagnosis and tr... 详细信息
来源: 评论
A blockchain-based Trust System for the Internet of Things  18
A blockchain-based Trust System for the Internet of Things
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Di Pietro, Roberto Salleras, Xavier Signorini, Matteo Waisbard, Erez HBKU CSE Doha Qatar UPF Barcelona Spain Nokia Bell Labs Murray Hill NJ USA
One of the biggest challenges for the Internet of Things (IoT) is to bridge the currently fragmented trust domains. The traditional PKI model relies on a common root of trust and does not fit well with the heterogeneo... 详细信息
来源: 评论