咨询与建议

限定检索结果

文献类型

  • 47 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 40 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 5 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 20 篇 access control
  • 6 篇 attribute-based ...
  • 5 篇 internet of thin...
  • 5 篇 policy mining
  • 5 篇 xacml
  • 5 篇 security
  • 4 篇 abac
  • 4 篇 big data
  • 4 篇 privacy
  • 3 篇 risk
  • 2 篇 policy formalism
  • 2 篇 deep learning
  • 2 篇 context-aware ap...
  • 2 篇 object tags
  • 2 篇 data lake
  • 2 篇 fuzzy inference
  • 2 篇 access control p...
  • 2 篇 relationship-bas...
  • 2 篇 iot
  • 2 篇 role based

机构

  • 3 篇 purdue univ w la...
  • 2 篇 arizona state un...
  • 2 篇 clemson univ cle...
  • 2 篇 rutgers state un...
  • 2 篇 univ insubria di...
  • 2 篇 iit kharagpur kh...
  • 1 篇 penn state univ ...
  • 1 篇 quantitat sci so...
  • 1 篇 university of te...
  • 1 篇 iit kharagpur kh...
  • 1 篇 rutgers universi...
  • 1 篇 purdue universit...
  • 1 篇 postech pohang
  • 1 篇 eindhoven univer...
  • 1 篇 univ north texas...
  • 1 篇 univ texas san a...
  • 1 篇 univ chinese aca...
  • 1 篇 imperial coll en...
  • 1 篇 mitre corp burli...
  • 1 篇 nokia bell labs ...

作者

  • 3 篇 gupta maanak
  • 3 篇 bertino elisa
  • 3 篇 sandhu ravi
  • 2 篇 colombo pietro
  • 2 篇 zannone nicola
  • 2 篇 patwa farhan
  • 2 篇 takabi hassan
  • 2 篇 vaidya jaideep
  • 2 篇 atluri vijayalak...
  • 2 篇 crampton jason
  • 2 篇 hu hongxin
  • 2 篇 ferrari elena
  • 2 篇 ranise silvio
  • 2 篇 sural shamik
  • 2 篇 ahn gail-joon
  • 1 篇 doyle jon
  • 1 篇 kim jong
  • 1 篇 choi jiwon
  • 1 篇 han wonkyu
  • 1 篇 gautam mayank

语言

  • 47 篇 英文
检索条件"任意字段=Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"
47 条 记 录,以下是31-40 订阅
排序:
Poster: Towards Greater Expressiveness, Flexibility, and Uniformity in access control  23
Poster: Towards Greater Expressiveness, Flexibility, and Uni...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Jiang, Jiaming Chirkova, Rada Doyle, Jon Rosenthal, Arnon North Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA Mitre Corp Burlington Rd Bedford MA 01730 USA
Attribute-based access control (ABAC) is a general access control model that subsumes numerous earlier access control models. Its increasing popularity stems from the intuitive generic structure of granting permission... 详细信息
来源: 评论
Attribute Expressions, Policy Tables and Attribute-Based access control  22
Attribute Expressions, Policy Tables and Attribute-Based Acc...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Crampton, Jason Williams, Conrad Royal Holloway Univ London Egham Hill Egham TW20 0EX Surrey England
Attribute-based access control (ABAC) has attracted considerable interest in recent years, prompting the development of the standardized XML-based language XacmL. ABAC policies written in languages like XacmL have a t... 详细信息
来源: 评论
A Deep Learning Approach for Extracting Attributes of ABAC Policies  18
A Deep Learning Approach for Extracting Attributes of ABAC P...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Alohaly, Manar Takabi, Hassan Blanco, Eduardo Univ North Texas Dept Comp Sci & Engn Denton TX 76203 USA Princess Nourah Bint Abdulrahman Univ Riyadh Saudi Arabia
The National Institute of Standards and Technology (NIST) has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language acce... 详细信息
来源: 评论
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records  22
A Distributed Multi-Authority Attribute Based Encryption Sch...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Pussewalage, Harsha S. Gardiyawasam Oleshchuk, Vladimir A. Univ Agder Dept ICT N-4898 Grimstad Norway
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud pla... 详细信息
来源: 评论
A lazy approach to access control as a service (ACaaS) for IoT: An AWS case study  18
A lazy approach to access control as a service (ACaaS) for I...
收藏 引用
23rd acm symposium on access control models and technologies, SacmAT 2018
作者: Ahmad, Tahir Morelli, Umberto Ranise, Silvio Zannone, Nicola Security and Trust Unit FBK-ICT Trento Italy DIBRIS University of Genova Italy Eindhoven University of Technology Netherlands
The Internet of Things (IoT) is receiving considerable attention from both industry and academia because of the new business models that it enables and the new security and privacy challenges that it generates. Major ... 详细信息
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
23rd acm symposium on access control models and technologies, SacmAT 2018
The proceedings contain 27 papers. The topics discussed include: automated coverage-based testing of XacmL policies;parametric RBAC maintenance via Max-SAT;independent key distribution protocols for broadcast authenti...
来源: 评论
Automated Coverage-Based Testing of XacmL Policies  18
Automated Coverage-Based Testing of XACML Policies
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Xu, Dianxiang Shrestha, Roshan Shen, Ning Boise State Univ Dept Comp Sci Boise ID 83725 USA
While(1) the standard language XacmL is very expressive for specifying fine-grained access control policies, defects can get into XacmL policies for various reasons, such as misunderstanding of access control requirem... 详细信息
来源: 评论
Administration in role-based access control  07
Administration in role-based access control
收藏 引用
2nd acm symposium on Information, Computer and Communications Security, ASIACCS '07
作者: Li, Ninghui Mao, Ziqing Center for Education and Research in Information Assurance and Security Department of Computer Science Purdue University West Lafayette IN 479072107 United States
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify six design requirements for administrat... 详细信息
来源: 评论
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things  18
Authorization Framework for Secure Cloud Assisted Connected ...
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Sandhu, Ravi Univ Texas San Antonio Dept Comp Sci ICS C SPECC San Antonio TX 78249 USA
Internet of Things has become a predominant phenomenon in every sphere of smart life. Connected Cars and Vehicular Internet of Things, which involves communication and data exchange between vehicles, traffic infrastru... 详细信息
来源: 评论
Securing Named Data Networks: Challenges and the Way Forward  18
Securing Named Data Networks: Challenges and the Way Forward
收藏 引用
23rd acm symposium on access control models and technologies (SacmAT)
作者: Bertino, Elisa Nabeel, Mohamed Purdue Univ W Lafayette IN 47907 USA Qatar Comp Res Inst Doha Qatar
Despite decades of research on the Internet security, we constantly hear about mega data breaches and malware infections affecting hundreds of millions of hosts. The key reason is that the current threat model of the ... 详细信息
来源: 评论