DeepContract: Controllable Authorization of Deep Learning Models
Abstract
References
Index Terms
- DeepContract: Controllable Authorization of Deep Learning Models
Recommendations
Recommendation Models for Open Authorization
Major online platforms such as Facebook, Google, and Twitter allow third-party applications such as games, and productivity applications access to user online private data. Such accesses must be authorized by users at installation time. The Open ...
Safety analysis of usage control authorization models
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications securityThe usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibility and expressive power of this model have been studied in previous work,...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- the National Key R&D Program of China
- the University Synergy Innovation Program of Anhui Province
- the Fundamental Research Funds for the Central Universities
- China National Natural Science Foundation
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 116Total Downloads
- Downloads (Last 12 months)116
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format