咨询与建议

限定检索结果

文献类型

  • 47 篇 会议

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 40 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 5 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 20 篇 access control
  • 6 篇 attribute-based ...
  • 5 篇 internet of thin...
  • 5 篇 policy mining
  • 5 篇 xacml
  • 5 篇 security
  • 4 篇 abac
  • 4 篇 big data
  • 4 篇 privacy
  • 3 篇 risk
  • 2 篇 policy formalism
  • 2 篇 deep learning
  • 2 篇 context-aware ap...
  • 2 篇 object tags
  • 2 篇 data lake
  • 2 篇 fuzzy inference
  • 2 篇 access control p...
  • 2 篇 relationship-bas...
  • 2 篇 iot
  • 2 篇 role based

机构

  • 3 篇 purdue univ w la...
  • 2 篇 arizona state un...
  • 2 篇 clemson univ cle...
  • 2 篇 rutgers state un...
  • 2 篇 univ insubria di...
  • 2 篇 iit kharagpur kh...
  • 1 篇 penn state univ ...
  • 1 篇 quantitat sci so...
  • 1 篇 university of te...
  • 1 篇 iit kharagpur kh...
  • 1 篇 rutgers universi...
  • 1 篇 purdue universit...
  • 1 篇 postech pohang
  • 1 篇 eindhoven univer...
  • 1 篇 univ north texas...
  • 1 篇 univ texas san a...
  • 1 篇 univ chinese aca...
  • 1 篇 imperial coll en...
  • 1 篇 mitre corp burli...
  • 1 篇 nokia bell labs ...

作者

  • 3 篇 gupta maanak
  • 3 篇 bertino elisa
  • 3 篇 sandhu ravi
  • 2 篇 colombo pietro
  • 2 篇 zannone nicola
  • 2 篇 patwa farhan
  • 2 篇 takabi hassan
  • 2 篇 vaidya jaideep
  • 2 篇 atluri vijayalak...
  • 2 篇 crampton jason
  • 2 篇 hu hongxin
  • 2 篇 ferrari elena
  • 2 篇 ranise silvio
  • 2 篇 sural shamik
  • 2 篇 ahn gail-joon
  • 1 篇 doyle jon
  • 1 篇 kim jong
  • 1 篇 choi jiwon
  • 1 篇 han wonkyu
  • 1 篇 gautam mayank

语言

  • 47 篇 英文
检索条件"任意字段=Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"
47 条 记 录,以下是41-50 订阅
排序:
Attribute Expressions, Policy Tables and Attribute-Based access control  22
Attribute Expressions, Policy Tables and Attribute-Based Acc...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Crampton, Jason Williams, Conrad Royal Holloway Univ London Egham Hill Egham TW20 0EX Surrey England
Attribute-based access control (ABAC) has attracted considerable interest in recent years, prompting the development of the standardized XML-based language XacmL. ABAC policies written in languages like XacmL have a t... 详细信息
来源: 评论
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records  22
A Distributed Multi-Authority Attribute Based Encryption Sch...
收藏 引用
22nd acm symposium on access control models and technologies (SacmAT)
作者: Pussewalage, Harsha S. Gardiyawasam Oleshchuk, Vladimir A. Univ Agder Dept ICT N-4898 Grimstad Norway
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud pla... 详细信息
来源: 评论
Policy-by-example for online social networks  12
Policy-by-example for online social networks
收藏 引用
17th acm symposium on access control models and technologies, SacmAT'12
作者: Cheek, Gorrell P. Shehab, Mohamed College of Computing and Informatics University of North Carolina at Charlotte Charlotte NC 28223 United States
We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group ... 详细信息
来源: 评论
User interface models for the cloud  10
User interface models for the cloud
收藏 引用
Adjunct proceedings of the 23nd annual acm symposium on User interface software and technology
作者: Pham, Hubert MIT CSAIL 32 Vassar Street Cambridge MA 02139 United States
The current desktop metaphor is unsuitable for the coming age of cloud-based applications. The desktop was developed in an era that was focused on local resources, and consequently its gestures, semantics, and securit... 详细信息
来源: 评论
Administration in role-based access control  07
Administration in role-based access control
收藏 引用
2nd acm symposium on Information, Computer and Communications Security, ASIACCS '07
作者: Li, Ninghui Mao, Ziqing Center for Education and Research in Information Assurance and Security Department of Computer Science Purdue University West Lafayette IN 479072107 United States
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify six design requirements for administrat... 详细信息
来源: 评论
proceedings of Eighth acm symposium on access control models and technologies
Proceedings of Eighth ACM Symposium on Access Control Models...
收藏 引用
proceedings of Eighth acm symposium on access control models and technologies
The proceedings contains 23 papers. Topics discussed include enterprise role administration, contraints, role based access control for collaborative environments, access control models and mechanisms, role engineering... 详细信息
来源: 评论
Role mining - revealing business roles for security administration using data mining technology  03
Role mining - revealing business roles for security administ...
收藏 引用
proceedings of the eighth acm symposium on access control models and technologies
作者: Martin Kuhlmann Dalia Shohat Gerhard Schimpf SYSTOR Security Solutions GmbH Hermann-Heinrich-Gossen-Strasse 3 Cologne SMF TEAM IT-Security Consulting Am Waldweg 23 Pforzheim
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to... 详细信息
来源: 评论