咨询与建议

限定检索结果

文献类型

  • 120 篇 会议
  • 78 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 168 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 28 篇 信息与通信工程
    • 27 篇 软件工程
    • 6 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 航空宇航科学与技...
  • 11 篇 理学
    • 6 篇 化学
    • 6 篇 生物学
    • 3 篇 数学
    • 1 篇 系统科学
  • 9 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 3 篇 公共管理
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 4 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 法学
    • 1 篇 政治学
    • 1 篇 社会学
  • 2 篇 农学
    • 1 篇 水产
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 201 篇 attribute-based ...
  • 36 篇 access control
  • 24 篇 blockchain
  • 19 篇 internet of thin...
  • 19 篇 security
  • 18 篇 privacy
  • 16 篇 role-based acces...
  • 13 篇 smart contract
  • 11 篇 xacml
  • 10 篇 abac
  • 8 篇 cloud computing
  • 8 篇 authorization
  • 7 篇 policy mining
  • 7 篇 hyperledger fabr...
  • 6 篇 access control p...
  • 6 篇 iot
  • 5 篇 data privacy
  • 5 篇 relationship-bas...
  • 5 篇 authentication
  • 5 篇 category-based a...

机构

  • 4 篇 univ texas dalla...
  • 4 篇 suny stony brook...
  • 4 篇 indian inst tech...
  • 3 篇 kings coll londo...
  • 3 篇 univ piraeus dep...
  • 3 篇 indian inst tech...
  • 3 篇 univ north texas...
  • 3 篇 suny stony brook...
  • 3 篇 boise state univ...
  • 2 篇 univ texas san a...
  • 2 篇 rutgers state un...
  • 2 篇 changchun univ s...
  • 2 篇 arizona state un...
  • 2 篇 indian inst tech...
  • 2 篇 guangzhou univ s...
  • 2 篇 indian inst tech...
  • 2 篇 univ sci & techn...
  • 2 篇 tsinghua univ de...
  • 2 篇 univ texas san a...
  • 2 篇 univ texas san a...

作者

  • 13 篇 sural shamik
  • 8 篇 sandhu ravi
  • 7 篇 vaidya jaideep
  • 7 篇 atluri vijayalak...
  • 7 篇 stoller scott d.
  • 5 篇 takabi hassan
  • 5 篇 thuraisingham bh...
  • 5 篇 fernandez maribe...
  • 4 篇 bhatt smriti
  • 3 篇 gupta maanak
  • 3 篇 xu zhongyuan
  • 3 篇 patwa farhan
  • 3 篇 bertolissi clara
  • 3 篇 gupta arobinda
  • 3 篇 verginadis yiann...
  • 3 篇 john john c.
  • 3 篇 krishnan ram
  • 3 篇 narouei masoud
  • 3 篇 bui thang
  • 3 篇 das saptarshi

语言

  • 199 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Attribute-based Access Control"
201 条 记 录,以下是1-10 订阅
排序:
Anonymity in attribute-based access control: Framework and Metric
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2024年 第1期21卷 463-475页
作者: Zhang, Runnan Liu, Gang Kang, Hongzhaoning Wang, Quan Wan, Bo Luo, Nan Xidian Univ Sch Comp Sci & Technol Xian 710071 Shaanxi Peoples R China Xidian Univ Guangzhou Inst Technol Xian 710071 Shaanxi Peoples R China Key Lab Smart Human Comp Interact & Wearable Techn Xian 710071 Shaanxi Peoples R China
Anonymous access is an effective method for preserving privacy in access control. This study assumes that anonymous access control requires both frameworks and policies. Numerous solutions have been proposed for anony... 详细信息
来源: 评论
attribute-based access control for AWS Internet of Things and Secure Industries of the Future
收藏 引用
IEEE access 2021年 9卷 107200-107223页
作者: Bhatt, Smriti Pham, Thanh Kim Gupta, Maanak Benson, James Park, Jaehong Sandhu, Ravi Purdue Univ Dept Comp & Informat Technol W Lafayette IN 47907 USA Tennessee Technol Univ Dept Comp Sci Cookeville TN 38505 USA Univ Texas San Antonio Dept Comp Sci Inst Cyber Secur San Antonio TX 78249 USA Univ Alabama Dept Management Mkt & Informat Syst Huntsville AL 35899 USA
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect. With a disruption of IoT devices and applications, attackers are leveraging weak authentication and access control ... 详细信息
来源: 评论
Authentication-enabled attribute-based access control for smart homes
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2023年 第2期22卷 479-495页
作者: Burakgazi Bilgen, Melike Abul, Osman Bicakci, Kemal TOBB Univ Econ & Technol Dept Comp Engn Ankara Turkey Istanbul Tech Univ Informat Inst Istanbul Turkey
Smart home technologies constantly bring significant convenience to our daily lives. Unfortunately, increased security risks accompany this convenience. There can be severe consequences when unauthorized or malicious ... 详细信息
来源: 评论
Enabling attribute-based access control in NoSQL Databases
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING 2023年 第1期11卷 208-223页
作者: Gupta, Eeshan Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India Rutgers State Univ Comp Informat Syst Newark NJ 07102 USA Rutgers State Univ MSIS Dept Comp Informat Syst Newark NJ 07102 USA Rutgers State Univ Ctr Informat Management Integrat & Connect CIMIC Newark NJ 07102 USA
NoSQL databases are being increasingly used for efficient management of high volumes of unstructured data in applications like information retrieval, natural language processing, social computing, etc. However, unlike... 详细信息
来源: 评论
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2022年 第3期21卷 489-508页
作者: Ghorbel, Amal Ghorbel, Mahmoud Jmaiel, Mohamed Univ Sfax ENIS ReDCAD Lab BP 1173 Sfax 3038 Tunisia Ctr Rech Numer Sfax Sfax 3021 Tunisia
When dealing with cloud services, there are important security requirements that are highly recommended to be achieved, notably, access control. Cloud services have provided several mechanisms based on traditional sol... 详细信息
来源: 评论
Smartaccess: attribute-based access control System for Medical Records based on Smart Contracts
收藏 引用
IEEE access 2022年 10卷 117836-117854页
作者: De Oliveira, Marcela Tuler Reis, Lucio Henrik Amorim Verginadis, Yiannis Mattos, Diogo Menezes Ferrazani Olabarriaga, Silvia Delgado Locat Univ Amsterdam Epidemiol & Data Sci Dept Amsterdam UMC NL-1105 AZ Amsterdam Netherlands Locat Univ Amsterdam Biomed Engn & Phys Dept Amsterdam UMC NL-1105 AZ Amsterdam Netherlands Univ Fed Fluminense MidiaCom TET PPGEET UFF BR-24020140 Niteroi RJ Brazil Athens Univ Econ & Business AUEB Sch Business Dept Business Adm Athens 10434 Greece Natl Tech Univ Athens NTUA Inst Commun & Comp Syst Athens 15780 Greece
Cross-organisation data sharing is challenging because all the involved organisations must agree on 'how' and 'why' the data is processed. Due to a lack of transparency, the organisations need to trust... 详细信息
来源: 评论
attribute-based access control for NoSQL Databases  21
Attribute-Based Access Control for NoSQL Databases
收藏 引用
11th ACM Conference on Data and Application Security and Privacy (CODASPY)
作者: Gupta, Eeshan Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi Indian Inst Technol Kharagpur W Bengal India Rutgers State Univ Newark NJ USA
NoSQL databases are gaining popularity in recent times for their ability to manage high volumes of unstructured data efficiently. This necessitates such databases to have strict data security mechanisms. attribute-Bas... 详细信息
来源: 评论
attribute-based access control scheme for data sharing on hyperledger fabric
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 67卷
作者: Zhao, Xiaojie Wang, Shangping Zhang, Yaling Wang, Yu Xian Univ Technol Sch Comp Sci & Engn Xian Shaanxi Peoples R China
With the popularization of the IoT and big data, the application value of data has become increasingly prominent. Therefore, it is particularly important to ensure the legitimate use of privacy data in the process of ... 详细信息
来源: 评论
Securing Smart Home IoT Systems with attribute-based access control  2
Securing Smart Home IoT Systems with Attribute-Based Access ...
收藏 引用
Secure and Trustworthy Cyber-Physical Systems (SaT-CPS)
作者: Goyal, Gaurav Liu, Peng Sural, Shamik Indian Inst Technol Kharagpur W Bengal India Penn State Univ University Pk PA 16802 USA
Over the last few years, there has been an increased proliferation of IoT systems for smart homes, enabling owners to remotely manage a variety of devices and gadgets installed on their properties. This growth was mad... 详细信息
来源: 评论
Mining attribute-based access control Policies  1
收藏 引用
18th International Conference on Information Systems Security (ICISS)
作者: Davari, Maryam Zulkernine, Mohammad Queens Univ Sch Comp Kingston ON Canada
The flexibility feature of attribute-based access control (ABAC) makes it a powerful access control model for supporting the authorization demands of complex and dynamic systems. However, the migration from traditiona... 详细信息
来源: 评论