咨询与建议

限定检索结果

文献类型

  • 47 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 40 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 5 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 20 篇 access control
  • 6 篇 attribute-based ...
  • 5 篇 internet of thin...
  • 5 篇 policy mining
  • 5 篇 xacml
  • 5 篇 security
  • 4 篇 abac
  • 4 篇 big data
  • 4 篇 privacy
  • 3 篇 risk
  • 2 篇 policy formalism
  • 2 篇 deep learning
  • 2 篇 context-aware ap...
  • 2 篇 object tags
  • 2 篇 data lake
  • 2 篇 fuzzy inference
  • 2 篇 access control p...
  • 2 篇 relationship-bas...
  • 2 篇 iot
  • 2 篇 role based

机构

  • 3 篇 purdue univ w la...
  • 2 篇 arizona state un...
  • 2 篇 clemson univ cle...
  • 2 篇 rutgers state un...
  • 2 篇 univ insubria di...
  • 2 篇 iit kharagpur kh...
  • 1 篇 penn state univ ...
  • 1 篇 quantitat sci so...
  • 1 篇 university of te...
  • 1 篇 iit kharagpur kh...
  • 1 篇 rutgers universi...
  • 1 篇 purdue universit...
  • 1 篇 postech pohang
  • 1 篇 eindhoven univer...
  • 1 篇 univ north texas...
  • 1 篇 univ texas san a...
  • 1 篇 univ chinese aca...
  • 1 篇 imperial coll en...
  • 1 篇 mitre corp burli...
  • 1 篇 nokia bell labs ...

作者

  • 3 篇 gupta maanak
  • 3 篇 bertino elisa
  • 3 篇 sandhu ravi
  • 2 篇 colombo pietro
  • 2 篇 zannone nicola
  • 2 篇 patwa farhan
  • 2 篇 takabi hassan
  • 2 篇 vaidya jaideep
  • 2 篇 atluri vijayalak...
  • 2 篇 crampton jason
  • 2 篇 hu hongxin
  • 2 篇 ferrari elena
  • 2 篇 ranise silvio
  • 2 篇 sural shamik
  • 2 篇 ahn gail-joon
  • 1 篇 doyle jon
  • 1 篇 kim jong
  • 1 篇 choi jiwon
  • 1 篇 han wonkyu
  • 1 篇 gautam mayank

语言

  • 47 篇 英文
检索条件"任意字段=Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"
47 条 记 录,以下是31-40 订阅
排序:
A Datalog Framework for Modeling Relationship-based access control Policies  22
A Datalog Framework for Modeling Relationship-based Access C...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Pasarella, Edelmira Lobo, Jorge Univ Politecn Cataluna Comp Sci Dept Barcelona Spain Univ Pompeu Fabra Inst Catalana Recerca & Estudis Avancats ICREA Barcelona Spain
Relationships like friendship to limit access to resources have been part of social network applications since their beginnings. Describing access control policies in terms of relationships is not particular to social... 详细信息
来源: 评论
proceedings of acm symposium on access control models and technologies, SacmAT
Proceedings of ACM Symposium on Access Control Models and Te...
收藏 引用
22nd acm symposium on access control models and technologies, SacmAT 2017
The proceedings contain 29 papers. The topics discussed include: a flexible authorization architecture for systems of interoperable medical devices;uncoupling biometrics from templates for secure and privacy-preservin...
来源: 评论
Towards a Top-down Policy Engineering Framework for Attribute-based access control  22
Towards a Top-down Policy Engineering Framework for Attribut...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Narouei, Masoud Khanpour, Hamed Takabi, Hassan Parde, Natalie Nielsen, Rodney Univ North Texas INSPIRE Lab Denton TX 76203 USA Univ North Texas Machine Learning Lab Denton TX 76203 USA Univ North Texas HiLT Lab Denton TX 76203 USA
Attribute-based access control (ABAC) is a logical access control methodology where authorization to perform a set of operations is based on attributes of the user, the objects being accessed, the environment, and a n... 详细信息
来源: 评论
FACT: Functionality-centric access control System for IoT Programming Frameworks  22
FACT: Functionality-centric Access Control System for IoT Pr...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Lee, Sanghak Choi, Jiwon Kim, Jihun Cho, Beumjin Lee, Sangho Kim, Hanjun Kim, Jong POSTECH Pohang South Korea Georgia Tech Atlanta GA USA
Improvement in the security and availability is important for the success of the Internet of Things (IoT). Given that recent IoT devices are likely to have multiple functionalities and support third-party applications... 详细信息
来源: 评论
A Flexible Authorization Architecture for Systems of Interoperable Medical Devices  22
A Flexible Authorization Architecture for Systems of Interop...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Tasali, Qais Chowdhury, Chandan Vasserman, Eugene Y. Kansas State Univ Dept Comp Sci Manhattan KS 66506 USA
Robust authentication and authorization are vital to next-generation distributed medical systems - the Medical Internet of Oings (MIoT). However, there is yet no good authorization model for real-time multi-channel da... 详细信息
来源: 评论
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis  22
Enabling Data Sharing in Contextual Environments: Policy Rep...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Karafili, Erisa Lupu, Emil C. Imperial Coll London 180 Queens Gate London SW7 2AZ England
Internet of Things environments enable us to capture more and more data about the physical environment we live in and about ourselves. The data enable us to optimise resources, personalise services and offer unprecede... 详细信息
来源: 评论
A Framework for the Cryptographic Enforcement of Information Flow Policies  22
A Framework for the Cryptographic Enforcement of Information...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Alderman, James Crampton, Jason Farley, Naomi Royal Holloway Univ London Informat Secur Grp Egham TW20 0EX Surrey England
It is increasingly common to outsource data storage to untrusted, third party (e.g. cloud) servers. However, in such settings, low-level online reference monitors may not be appropriate for enforcing read access, and ... 详细信息
来源: 评论
Leveraging Hardware Isolation for Process Level access control & Authentication  22
Leveraging Hardware Isolation for Process Level Access Contr...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Haider, Syed Kamran Omar, Hamza Lebedev, Ilia Devadas, Srinivas van Dijk, Marten Univ Connecticut Storrs CT 06269 USA MIT Cambridge MA 02139 USA
Critical resource sharing among multiple entities in a processing system is inevitable, which in turn calls for the presence of appropriate authentication and access control mechanisms. Generally speaking, these mecha... 详细信息
来源: 评论
Towards PII-based Multiparty access control for Photo Sharing in Online Social Networks  22
Towards PII-based Multiparty Access Control for Photo Sharin...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Vishwamitra, Nishant Li, Yifang Wang, Kevin Hu, Hongxin Caine, Kelly Ahn, Gail-Joon Clemson Univ Clemson SC 29631 USA Arizona State Univ Tempe AZ 85287 USA
The privacy control models of current Online Social Networks (OSNs) are biased towards the content owners' policy settings. Additionally, those privacy policy settings are too coarse-grained to allow users to cont... 详细信息
来源: 评论
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment  22
Multi-Layer Authorization Framework for a Representative Had...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Gupta, Maanak Patwa, Farhan Benson, James Sandhu, Ravi Univ Texas San Antonio Inst Cyber Secur One UTSA Circle San Antonio TX 78249 USA Univ Texas San Antonio Dept Comp Sci One UTSA Circle San Antonio TX 78249 USA
Apache Hadoop is a predominant software framework to store and process vast amount of data, produced in varied formats. Data stored in Hadoop multi-tenant data lake often includes sensitive data such as social securit... 详细信息
来源: 评论