首页 > 最新文献

Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Federated Synthetic Data Generation with Stronger Security Guarantees 具有更强安全保证的联邦合成数据生成
Ali Reza Ghavamipour, F. Turkmen, Rui Wang, K. Liang
{"title":"Federated Synthetic Data Generation with Stronger Security Guarantees","authors":"Ali Reza Ghavamipour, F. Turkmen, Rui Wang, K. Liang","doi":"10.1145/3589608.3593835","DOIUrl":"https://doi.org/10.1145/3589608.3593835","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"56 1","pages":"31-42"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75716533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups 安全通行证:弱势群体在隐私、问责、安全和安全方面的管理、倡导、公平和赋权
Indrajit Ray, B. Thuraisingham, Jaideep Vaidya, S. Mehrotra, V. Atluri, Indrakshi Ray, Murat Kantarcioglu, R. Raskar, Babak Salimi, Steve Simske, N. Venkatasubramanian, Vivek K. Singh
{"title":"SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups","authors":"Indrajit Ray, B. Thuraisingham, Jaideep Vaidya, S. Mehrotra, V. Atluri, Indrakshi Ray, Murat Kantarcioglu, R. Raskar, Babak Salimi, Steve Simske, N. Venkatasubramanian, Vivek K. Singh","doi":"10.1145/3589608.3593830","DOIUrl":"https://doi.org/10.1145/3589608.3593830","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"29 1","pages":"145-155"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91231916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Access Control Policies for Smart Homes 智能家居访问控制策略的安全性分析
Roberta Cimorelli Belfiore, A. L. Ferrara
{"title":"Security Analysis of Access Control Policies for Smart Homes","authors":"Roberta Cimorelli Belfiore, A. L. Ferrara","doi":"10.1145/3589608.3593842","DOIUrl":"https://doi.org/10.1145/3589608.3593842","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"8 1 1","pages":"99-106"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83839550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots 海报:如何培养机器人-超越辅助类人机器人的访问控制约束
N. Hemken, F. Jacob, Fabian Peller-Konrad, Rainer Kartmann, T. Asfour, H. Hartenstein
Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they also should respect various constraints, for access control and beyond. We explore incorporating privacy and security constraints (Activity-Centric Access Control and Deep Learning Based Access Control) with robot task planning approaches (classical symbolic planning and end-to-end learning-based planning). We report pre-liminary results on their respective trade-offs and conclude that a hybrid approach will most likely be the method of choice.
人形机器人将能够在日常生活中帮助人类,特别是由于它们的多功能动作能力。然而,虽然这些机器人需要一定程度的自主性来学习和探索,但它们也应该尊重各种限制,例如访问控制等。我们探索将隐私和安全约束(以活动为中心的访问控制和基于深度学习的访问控制)与机器人任务规划方法(经典符号规划和端到端基于学习的规划)相结合。我们报告了他们各自权衡的初步结果,并得出结论,混合方法最有可能是选择的方法。
{"title":"Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots","authors":"N. Hemken, F. Jacob, Fabian Peller-Konrad, Rainer Kartmann, T. Asfour, H. Hartenstein","doi":"10.1145/3589608.3595078","DOIUrl":"https://doi.org/10.1145/3589608.3595078","url":null,"abstract":"Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they also should respect various constraints, for access control and beyond. We explore incorporating privacy and security constraints (Activity-Centric Access Control and Deep Learning Based Access Control) with robot task planning approaches (classical symbolic planning and end-to-end learning-based planning). We report pre-liminary results on their respective trade-offs and conclude that a hybrid approach will most likely be the method of choice.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"32 1","pages":"55-57"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72944264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality 利用授权策略防止移动增强现实中的空间和隐私攻击
Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn
Mobile Augmented Reality (MAR) is a portable, powerful, and suitable technology that integrates digital content , e.g., 3D virtual objects, into the physical world, which not only has been implemented for multiple intents such as shopping, entertainment, gaming, etc., but it is also expected to grow at a tremendous rate in the upcoming years. Unfortunately, the applications that implement MAR, hereby referred to as MAR-Apps, bear security issues, which have been imaged in worldwide incidents such as robberies, which has led authorities to ban MAR-Apps at specific locations. Existing problems with MAR-Apps can be classified into three categories: first, Space Invasion , which implies the intrusive modification through MAR of sensitive spaces, e.g., hospitals, memorials, etc. Second, Space Affectation , which involves the degradation of users’ experience via interaction with undesirable MAR or malicious entities. Finally, MAR-Apps mishandling sensitive data leads to Privacy Leaks . To alleviate these concerns, we present an approach for Policy-Governed MAR-Apps, which allows end-users to fully control under what circumstances, e.g., their presence inside a given sensitive space, digital content may be displayed by MAR-Apps. Through SpaceMediator , a proof-of-concept MAR-App that imitates the well-known and successful MAR-App Pokémon GO, we evaluated our approach through a user study with 40 participants, who recognized and prevented the issues just described with success rates as high as 92.50%. Furthermore, there is an enriched interest in Policy-Governed MAR-Apps as 87.50% of participants agreed with it, and 82.50% would use it to implement content-based restrictions in MAR-Apps. These promising results encourage the adoption of our solution in future MAR-Apps
移动增强现实(MAR)是一种便携、强大、合适的技术,它将数字内容(如3D虚拟对象)集成到物理世界中,不仅用于购物、娱乐、游戏等多种目的,而且预计在未来几年将以惊人的速度增长。不幸的是,执行MAR的应用程序(以下简称MAR- apps)存在安全问题,这些问题在全球范围内的抢劫等事件中被发现,这导致当局在特定地点禁止MAR- apps。MAR- apps存在的问题可以分为三类:一是空间入侵,即通过MAR侵入性地修改敏感空间,如医院、纪念馆等。第二,空间影响,这涉及通过与不受欢迎的MAR或恶意实体的交互而降低用户体验。最后,mar应用程序对敏感数据的处理不当会导致隐私泄露。为了减轻这些担忧,我们提出了一种策略管理的MAR-Apps方法,它允许最终用户完全控制在什么情况下,例如,他们在给定的敏感空间内的存在,MAR-Apps可以显示数字内容。通过SpaceMediator,一款模仿著名且成功的MAR-App poksammon GO的概念验证MAR-App,我们通过40名参与者的用户研究评估了我们的方法,他们识别并防止了刚才描述的问题,成功率高达92.50%。此外,对policy - controlled MAR-Apps的兴趣浓厚,87.50%的参与者同意它,82.50%的参与者将使用它在MAR-Apps中实现基于内容的限制。这些有希望的结果鼓励在未来的mar应用程序中采用我们的解决方案
{"title":"SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality","authors":"Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn","doi":"10.1145/3589608.3593839","DOIUrl":"https://doi.org/10.1145/3589608.3593839","url":null,"abstract":"Mobile Augmented Reality (MAR) is a portable, powerful, and suitable technology that integrates digital content , e.g., 3D virtual objects, into the physical world, which not only has been implemented for multiple intents such as shopping, entertainment, gaming, etc., but it is also expected to grow at a tremendous rate in the upcoming years. Unfortunately, the applications that implement MAR, hereby referred to as MAR-Apps, bear security issues, which have been imaged in worldwide incidents such as robberies, which has led authorities to ban MAR-Apps at specific locations. Existing problems with MAR-Apps can be classified into three categories: first, Space Invasion , which implies the intrusive modification through MAR of sensitive spaces, e.g., hospitals, memorials, etc. Second, Space Affectation , which involves the degradation of users’ experience via interaction with undesirable MAR or malicious entities. Finally, MAR-Apps mishandling sensitive data leads to Privacy Leaks . To alleviate these concerns, we present an approach for Policy-Governed MAR-Apps, which allows end-users to fully control under what circumstances, e.g., their presence inside a given sensitive space, digital content may be displayed by MAR-Apps. Through SpaceMediator , a proof-of-concept MAR-App that imitates the well-known and successful MAR-App Pokémon GO, we evaluated our approach through a user study with 40 participants, who recognized and prevented the issues just described with success rates as high as 92.50%. Furthermore, there is an enriched interest in Policy-Governed MAR-Apps as 87.50% of participants agreed with it, and 82.50% would use it to implement content-based restrictions in MAR-Apps. These promising results encourage the adoption of our solution in future MAR-Apps","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"105 1","pages":"79-90"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74822397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coverage-Based Testing of Obligations in NGAC Systems NGAC系统中基于覆盖率的义务测试
Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu
{"title":"Coverage-Based Testing of Obligations in NGAC Systems","authors":"Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu","doi":"10.1145/3589608.3593832","DOIUrl":"https://doi.org/10.1145/3589608.3593832","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"16 1","pages":"169-179"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75468664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS) 演示:智能手机用户认证(MBBS)的多模式行为生物识别方案
Attaullah Buriro, Samuele Ceol
{"title":"Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS)","authors":"Attaullah Buriro, Samuele Ceol","doi":"10.1145/3589608.3595083","DOIUrl":"https://doi.org/10.1145/3589608.3595083","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"4 1","pages":"43-45"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73059652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sidecar-based Path-aware Security for Microservices 基于sidecar的微服务路径感知安全性
C. Meadows, Sena Hounsinou, Timothy Wood, Gedare Bloom
{"title":"Sidecar-based Path-aware Security for Microservices","authors":"C. Meadows, Sena Hounsinou, Timothy Wood, Gedare Bloom","doi":"10.1145/3589608.3594742","DOIUrl":"https://doi.org/10.1145/3589608.3594742","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"6 1","pages":"157-162"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72691776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Qualitative Intention-aware Attribute-based Access Control Policy Refinement 基于定性意向感知属性的访问控制策略细化
Shohei Mitani, Jonghoon Kwon, N. Ghate, Taniya Singh, Hirofumi Ueda, A. Perrig
Designing access control policies is often expensive and tedious due to the heterogeneous systems, services, and diverse user demands. Although ABAC policy and decision engine creation methods based on machine learning have been proposed, they cannot make good access decisions for applications and situations not envisioned by the decision-makers who provide training examples. It results in over-and under-permissiveness. In this paper, we propose a framework that refines pre-developed policies. It creates a decision engine that makes better decisions than those policies. Inspired by multiple criteria decision theory, our method uses the policy manager’s qualitative intentions behind their judgments to guide access decisions so that more benefits are expected. In the evaluation, we prepare a coarse and relatively elaborate policy. We refine the coarse policy to obtain a decision engine that is compared for the similarity in access decisions with the elaborate policy using AUC as a measure. The results show that our method improves the coarse policy by a difference of 12–26% in AUC and outperforms the conventional machine learning methods by a difference of 3–11% in AUC.
{"title":"Qualitative Intention-aware Attribute-based Access Control Policy Refinement","authors":"Shohei Mitani, Jonghoon Kwon, N. Ghate, Taniya Singh, Hirofumi Ueda, A. Perrig","doi":"10.1145/3589608.3593841","DOIUrl":"https://doi.org/10.1145/3589608.3593841","url":null,"abstract":"Designing access control policies is often expensive and tedious due to the heterogeneous systems, services, and diverse user demands. Although ABAC policy and decision engine creation methods based on machine learning have been proposed, they cannot make good access decisions for applications and situations not envisioned by the decision-makers who provide training examples. It results in over-and under-permissiveness. In this paper, we propose a framework that refines pre-developed policies. It creates a decision engine that makes better decisions than those policies. Inspired by multiple criteria decision theory, our method uses the policy manager’s qualitative intentions behind their judgments to guide access decisions so that more benefits are expected. In the evaluation, we prepare a coarse and relatively elaborate policy. We refine the coarse policy to obtain a decision engine that is compared for the similarity in access decisions with the elaborate policy using AUC as a measure. The results show that our method improves the coarse policy by a difference of 12–26% in AUC and outperforms the conventional machine learning methods by a difference of 3–11% in AUC.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"2016 1","pages":"201-208"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74034618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Automated Learning of Access Control Policies Enforced by Web Applications Web应用程序访问控制策略的自动学习
Padmavathi Iyer, A. Masoumzadeh
Obtaining an accurate specification of the access control policy enforced by an application is essential in ensuring that it meets our security/privacy expectations. This is especially important as many of real-world applications handle a large amount and variety of data objects that may have different applicable policies. We investigate the problem of automated learning of access control policies from web applications. The existing research on mining access control policies has mainly focused on developing algorithms for inferring correct and concise policies from low-level authorization information. However, little has been done in terms of systematically gathering the low-level authorization data and applications’ data models that are prerequisite to such a mining process. In this paper, we propose a novel black-box approach to inferring those prereq-uisites and discuss our initial observations on employing such a framework in learning policies from real-world web applications.
获取应用程序执行的访问控制策略的准确规范对于确保它满足我们的安全/隐私期望至关重要。这一点尤其重要,因为现实世界中的许多应用程序处理大量不同的数据对象,这些数据对象可能具有不同的适用策略。我们研究了从web应用程序中自动学习访问控制策略的问题。现有的访问控制策略挖掘研究主要集中在开发从底层授权信息中推断出正确、简洁策略的算法。然而,在系统地收集低级授权数据和应用程序的数据模型方面做得很少,而低级授权数据和应用程序的数据模型是这种挖掘过程的先决条件。在本文中,我们提出了一种新的黑盒方法来推断这些先决条件,并讨论了我们在使用这种框架从现实世界的web应用程序中学习策略时的初步观察。
{"title":"Towards Automated Learning of Access Control Policies Enforced by Web Applications","authors":"Padmavathi Iyer, A. Masoumzadeh","doi":"10.1145/3589608.3594743","DOIUrl":"https://doi.org/10.1145/3589608.3594743","url":null,"abstract":"Obtaining an accurate specification of the access control policy enforced by an application is essential in ensuring that it meets our security/privacy expectations. This is especially important as many of real-world applications handle a large amount and variety of data objects that may have different applicable policies. We investigate the problem of automated learning of access control policies from web applications. The existing research on mining access control policies has mainly focused on developing algorithms for inferring correct and concise policies from low-level authorization information. However, little has been done in terms of systematically gathering the low-level authorization data and applications’ data models that are prerequisite to such a mining process. In this paper, we propose a novel black-box approach to inferring those prereq-uisites and discuss our initial observations on employing such a framework in learning policies from real-world web applications.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"17 1","pages":"163-168"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87544963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1