咨询与建议

限定检索结果

文献类型

  • 47 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 40 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 5 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 20 篇 access control
  • 6 篇 attribute-based ...
  • 5 篇 internet of thin...
  • 5 篇 policy mining
  • 5 篇 xacml
  • 5 篇 security
  • 4 篇 abac
  • 4 篇 big data
  • 4 篇 privacy
  • 3 篇 risk
  • 2 篇 policy formalism
  • 2 篇 deep learning
  • 2 篇 context-aware ap...
  • 2 篇 object tags
  • 2 篇 data lake
  • 2 篇 fuzzy inference
  • 2 篇 access control p...
  • 2 篇 relationship-bas...
  • 2 篇 iot
  • 2 篇 role based

机构

  • 3 篇 purdue univ w la...
  • 2 篇 arizona state un...
  • 2 篇 clemson univ cle...
  • 2 篇 rutgers state un...
  • 2 篇 univ insubria di...
  • 2 篇 iit kharagpur kh...
  • 1 篇 penn state univ ...
  • 1 篇 quantitat sci so...
  • 1 篇 university of te...
  • 1 篇 iit kharagpur kh...
  • 1 篇 rutgers universi...
  • 1 篇 purdue universit...
  • 1 篇 postech pohang
  • 1 篇 eindhoven univer...
  • 1 篇 univ north texas...
  • 1 篇 univ texas san a...
  • 1 篇 univ chinese aca...
  • 1 篇 imperial coll en...
  • 1 篇 mitre corp burli...
  • 1 篇 nokia bell labs ...

作者

  • 3 篇 gupta maanak
  • 3 篇 bertino elisa
  • 3 篇 sandhu ravi
  • 2 篇 colombo pietro
  • 2 篇 zannone nicola
  • 2 篇 patwa farhan
  • 2 篇 takabi hassan
  • 2 篇 vaidya jaideep
  • 2 篇 atluri vijayalak...
  • 2 篇 crampton jason
  • 2 篇 hu hongxin
  • 2 篇 ferrari elena
  • 2 篇 ranise silvio
  • 2 篇 sural shamik
  • 2 篇 ahn gail-joon
  • 1 篇 doyle jon
  • 1 篇 kim jong
  • 1 篇 choi jiwon
  • 1 篇 han wonkyu
  • 1 篇 gautam mayank

语言

  • 47 篇 英文
检索条件"任意字段=Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"
47 条 记 录,以下是11-20 订阅
排序:
Poster: Using Gini Impurity to Mine Attribute-based access control Policies with Environment Attributes  23
Poster: Using Gini Impurity to Mine Attribute-based Access C...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Das, Saptarshi Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi IIT Kharagpur Kharagpur W Bengal India Rutgers State Univ New Brunswick NJ USA
In Attribute-based access control (ABAC) systems, utilizing environment attributes along with the subject and object attributes introduces a dynamic nature to the access decisions. The inclusion of environment attribu... 详细信息
来源: 评论
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity control  22
Poster: On the Safety and Efficiency of Virtual Firewall Ela...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Li, Hongda Deng, Juan Hu, Hongxin Wang, Kuang-Ching Ahn, Gail-Joon Zhao, Ziming Han, Wonkyu Clemson Univ Clemson SC 29631 USA Arizona State Univ Tempe AZ 85287 USA
Firewalls have been typically used to enforce network access control. Network Functions Virtualization (NFV) envisions to implement firewall function as software instance (a.k.a virtual firewall). Virtual firewall pro... 详细信息
来源: 评论
Self-Generation of access control Policies  18
Self-Generation of Access Control Policies
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Calo, Seraphin Verma, Dinesh Chakraborty, Supriyo Bertino, Elisa Lupu, Emil Cirincione, Gregory IBM Res Yorktown Hts NY 10598 USA Purdue Univ W Lafayette IN 47907 USA Imperial Coll London England Army Res Labs Adelphi MD USA
access control for information has primarily focused on access statically granted to subjects by administrators usually in the context of a specific system. Even if mechanisms are available for access revocation, revo... 详细信息
来源: 评论
Multi-Party access control: Requirements, State of the Art and Open Challenges  18
Multi-Party Access Control: Requirements, State of the Art a...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Squicciarini, Anna Cinzia Rajtmajer, Sarah Michele Zannone, Nicola Penn State Univ University Pk PA 16802 USA Quantitat Sci Solut Arlington VA USA Eindhoven Univ Technol Eindhoven Netherlands
Multi-party access control is gaining attention and prominence within the community, as access control models and systems are faced with complex, jointly-owned and jointly-managed content. Traditional single-user appr... 详细信息
来源: 评论
On Risk in access control Enforcement  22
On Risk in Access Control Enforcement
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Petracca, Giuseppe Capobianco, Frank Skalka, Christian Jaeger, Trent Penn State Univ Sch Elect Engn & Comp Sci University Pk PA 16802 USA Univ Vermont Coll Engn & Math Sci Burlington VT 05405 USA
While we have long had principles describing how access control enforcement should be implemented, such as the reference monitor concept, imprecision in access control mechanisms and access control policies leads to r... 详细信息
来源: 评论
A Datalog Framework for Modeling Relationship-based access control Policies  22
A Datalog Framework for Modeling Relationship-based Access C...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Pasarella, Edelmira Lobo, Jorge Univ Politecn Cataluna Comp Sci Dept Barcelona Spain Univ Pompeu Fabra Inst Catalana Recerca & Estudis Avancats ICREA Barcelona Spain
Relationships like friendship to limit access to resources have been part of social network applications since their beginnings. Describing access control policies in terms of relationships is not particular to social... 详细信息
来源: 评论
HCAP: A History-Based Capability System for IoT Devices  18
HCAP: A History-Based Capability System for IoT Devices
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Tandon, Lakshya Fong, Philip W. L. Safavi-Naini, Reihaneh Univ Calgary Calgary AB Canada
Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constrain... 详细信息
来源: 评论
Privacy-Aware Risk-Adaptive access control in Health Information Systems using Topic models  18
Privacy-Aware Risk-Adaptive Access Control in Health Informa...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Zhang, Wenxi Li, Hao Zhang, Min Lv, Zhiquan Chinese Acad Sci Inst Software Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China Coordinat Ctr China Natl Comp Network Emergency Response Tech Team Beijing Peoples R China
Traditional role-based access control fails to meet the privacy requirements for patient data in medical systems, as it is infeasible for policy makers to foresee what information doctors may need for diagnosis and tr... 详细信息
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
22nd acm symposium on access control models and technologies, SacmAT 2017
The proceedings contain 29 papers. The topics discussed include: a flexible authorization architecture for systems of interoperable medical devices;uncoupling biometrics from templates for secure and privacy-preservin...
来源: 评论
Towards a Top-down Policy Engineering Framework for Attribute-based access control  22
Towards a Top-down Policy Engineering Framework for Attribut...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Narouei, Masoud Khanpour, Hamed Takabi, Hassan Parde, Natalie Nielsen, Rodney Univ North Texas INSPIRE Lab Denton TX 76203 USA Univ North Texas Machine Learning Lab Denton TX 76203 USA Univ North Texas HiLT Lab Denton TX 76203 USA
Attribute-based access control (ABAC) is a logical access control methodology where authorization to perform a set of operations is based on attributes of the user, the objects being accessed, the environment, and a n... 详细信息
来源: 评论