咨询与建议

限定检索结果

文献类型

  • 47 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 40 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 5 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 20 篇 access control
  • 6 篇 attribute-based ...
  • 5 篇 internet of thin...
  • 5 篇 policy mining
  • 5 篇 xacml
  • 5 篇 security
  • 4 篇 abac
  • 4 篇 big data
  • 4 篇 privacy
  • 3 篇 risk
  • 2 篇 policy formalism
  • 2 篇 deep learning
  • 2 篇 context-aware ap...
  • 2 篇 object tags
  • 2 篇 data lake
  • 2 篇 fuzzy inference
  • 2 篇 access control p...
  • 2 篇 relationship-bas...
  • 2 篇 iot
  • 2 篇 role based

机构

  • 3 篇 purdue univ w la...
  • 2 篇 arizona state un...
  • 2 篇 clemson univ cle...
  • 2 篇 rutgers state un...
  • 2 篇 univ insubria di...
  • 2 篇 iit kharagpur kh...
  • 1 篇 penn state univ ...
  • 1 篇 quantitat sci so...
  • 1 篇 university of te...
  • 1 篇 iit kharagpur kh...
  • 1 篇 rutgers universi...
  • 1 篇 purdue universit...
  • 1 篇 postech pohang
  • 1 篇 eindhoven univer...
  • 1 篇 univ north texas...
  • 1 篇 univ texas san a...
  • 1 篇 univ chinese aca...
  • 1 篇 imperial coll en...
  • 1 篇 mitre corp burli...
  • 1 篇 nokia bell labs ...

作者

  • 3 篇 gupta maanak
  • 3 篇 bertino elisa
  • 3 篇 sandhu ravi
  • 2 篇 colombo pietro
  • 2 篇 zannone nicola
  • 2 篇 patwa farhan
  • 2 篇 takabi hassan
  • 2 篇 vaidya jaideep
  • 2 篇 atluri vijayalak...
  • 2 篇 crampton jason
  • 2 篇 hu hongxin
  • 2 篇 ferrari elena
  • 2 篇 ranise silvio
  • 2 篇 sural shamik
  • 2 篇 ahn gail-joon
  • 1 篇 doyle jon
  • 1 篇 kim jong
  • 1 篇 choi jiwon
  • 1 篇 han wonkyu
  • 1 篇 gautam mayank

语言

  • 47 篇 英文
检索条件"任意字段=Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"
47 条 记 录,以下是21-30 订阅
排序:
Data Breach and Multiple Points to Stop It  18
Data Breach and Multiple Points to Stop It
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Yao, Danfeng (Daphne) Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA
Preventing unauthorized access to sensitive data is an exceedingly complex access control problem. In this keynote, I will break down the data breach problem and give insights into how organizations could and should d... 详细信息
来源: 评论
Using Gini Impurity to Mine Attribute-based access control Policies with Environment Attributes  18
Using Gini Impurity to Mine Attribute-based Access Control P...
收藏 引用
proceedings of the 23nd acm on symposium on access control models and technologies
作者: Saptarshi Das Shamik Sural Jaideep Vaidya Vijayalakshmi Atluri IIT Kharagpur Kharagpur India Rutgers University Newark NJ USA
In Attribute-based access control (ABAC) systems, utilizing environment attributes along with the subject and object attributes introduces a dynamic nature to the access decisions. The inclusion of environment attribu... 详细信息
来源: 评论
Toward A Code Pattern Based Vulnerability Measurement Model  18
Toward A Code Pattern Based Vulnerability Measurement Model
收藏 引用
proceedings of the 23nd acm on symposium on access control models and technologies
作者: John Heaps Rocky Slavin Xiaoyin Wang University of Texas at San Antonio San Antonio TX USA
Many access control patterns, both positive and negative, have been identified in the past. However, there is little research describing how to leverage those patterns for the detection of access control bugs in code.... 详细信息
来源: 评论
Towards Greater Expressiveness, Flexibility, and Uniformity in access control  18
Towards Greater Expressiveness, Flexibility, and Uniformity ...
收藏 引用
proceedings of the 23nd acm on symposium on access control models and technologies
作者: Jiaming Jiang Rada Chirkova Jon Doyle Arnon Rosenthal North Carolina State University Raleigh NC USA The MITRE Corporation Bedford MA USA
Attribute-based access control (ABAC) is a general access control model that subsumes numerous earlier access control models. Its increasing popularity stems from the intuitive generic structure of granting permission... 详细信息
来源: 评论
Poster: Constrained Policy Mining in Attribute Based access control  22
Poster: Constrained Policy Mining in Attribute Based Access ...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Gautam, Mayank Jha, Sadhana Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi IIT Kharagpur Kharagpur W Bengal India Rutgers State Univ New Brunswick NJ USA
In practical access control systems, it is important to enforce an upper bound on the time taken to respond to an access request. This response time is directly influenced by the size (often called the weight) of each... 详细信息
来源: 评论
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems  22
Security Analysis and Legal Compliance Checking for the Desi...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Guarda, Paolo Ranise, Silvio Siswantoro, Hari Univ Trento Fac Law Trento Italy FBK Irst Secur & Trust Trento Italy Univ Trento DISI Trento Italy
Nowadays, most of business practices involve personal data processing of customers and employees. This is strictly regulated by legislation to protect the rights of the data subject. Enforcing regulation into enterpri... 详细信息
来源: 评论
Mining Relationship-Based access control Policies  22
Mining Relationship-Based Access Control Policies
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Thang Bui Stoller, Scott D. Li, Jiajie SUNY Stony Brook Stony Brook NY 11794 USA
Relationship-based access control (ReBAC) provides a high level of expressiveness and flexibility that promotes security and information sharing. We formulate ReBAC as an object-oriented extension of attribute-based a... 详细信息
来源: 评论
POSTER: access control Model for the Hadoop Ecosystem  22
POSTER: Access Control Model for the Hadoop Ecosystem
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Patwa, Farhan Sandhu, Ravi UT San Antonio Dept Comp Sci Inst Cyber Secur One UTSA Circle San Antonio TX 78249 USA
Apache Hadoop is an important framework for fault-tolerant and distributed storage and processing of Big Data. Hadoop core platform along with other open-source tools such as Apache Hive, Storm, HBase offer an ecosyst... 详细信息
来源: 评论
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity control  22
Poster: On the Safety and Efficiency of Virtual Firewall Ela...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Li, Hongda Deng, Juan Hu, Hongxin Wang, Kuang-Ching Ahn, Gail-Joon Zhao, Ziming Han, Wonkyu Clemson Univ Clemson SC 29631 USA Arizona State Univ Tempe AZ 85287 USA
Firewalls have been typically used to enforce network access control. Network Functions Virtualization (NFV) envisions to implement firewall function as software instance (a.k.a virtual firewall). Virtual firewall pro... 详细信息
来源: 评论
On Risk in access control Enforcement  22
On Risk in Access Control Enforcement
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Petracca, Giuseppe Capobianco, Frank Skalka, Christian Jaeger, Trent Penn State Univ Sch Elect Engn & Comp Sci University Pk PA 16802 USA Univ Vermont Coll Engn & Math Sci Burlington VT 05405 USA
While we have long had principles describing how access control enforcement should be implemented, such as the reference monitor concept, imprecision in access control mechanisms and access control policies leads to r... 详细信息
来源: 评论