咨询与建议

限定检索结果

文献类型

  • 33 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 27 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 4 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 5 篇 privacy
  • 3 篇 internet of thin...
  • 3 篇 traffic analysis
  • 3 篇 behavior-based t...
  • 3 篇 android (operati...
  • 3 篇 pattern recognit...
  • 2 篇 access control
  • 2 篇 preference model
  • 2 篇 cloud computing
  • 2 篇 cloud storage
  • 1 篇 dropbox
  • 1 篇 paillier
  • 1 篇 runtime
  • 1 篇 interdependent p...
  • 1 篇 homomorphic encr...
  • 1 篇 data privacy
  • 1 篇 user profile
  • 1 篇 hidden markov mo...
  • 1 篇 big data
  • 1 篇 sensitive data

机构

  • 3 篇 southeast univ s...
  • 2 篇 global energy in...
  • 1 篇 university of so...
  • 1 篇 faculty of scien...
  • 1 篇 university of br...
  • 1 篇 new york univ ab...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 computer science...
  • 1 篇 university of mi...
  • 1 篇 state grid smart...
  • 1 篇 edificio la arbo...
  • 1 篇 department of ps...
  • 1 篇 ecole polytech f...
  • 1 篇 cryptography and...
  • 1 篇 chinese academy ...
  • 1 篇 college of infor...
  • 1 篇 security researc...

作者

  • 3 篇 gu xiaodan
  • 3 篇 ling zhen
  • 3 篇 luo junzhou
  • 3 篇 yang ming
  • 2 篇 bertino elisa
  • 2 篇 shi congcong
  • 1 篇 kini gananand
  • 1 篇 bisht prithvi
  • 1 篇 lee adam j.
  • 1 篇 zhao rui
  • 1 篇 skrupsky nazari
  • 1 篇 mittag jens
  • 1 篇 petracca giusepp...
  • 1 篇 rosen sanae
  • 1 篇 chen xihui
  • 1 篇 oikonomou george
  • 1 篇 rastogi vaibhav
  • 1 篇 venkatakrishnan ...
  • 1 篇 harkous hamza
  • 1 篇 bao feng

语言

  • 34 篇 英文
检索条件"任意字段=3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013"
34 条 记 录,以下是11-20 订阅
Engineering access control policies for provenance-aware systems  13
Engineering access control policies for provenance-aware sys...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Sun, Lianshan Park, Jaehong Sandhu, Ravi Dept. of Computer Science Shaanxi Univ. of Sci. and Tech Xi'an Shaanxi China Insitute for Cyber Security Univ. of Texas at San Antonio San Antonio TX United States
Provenance is meta-data about how data items become what they are. A variety of provenance-aware access control models and policy languages have been recently discussed in the literature. However, the issue of eliciti... 详细信息
来源: 评论
AppProfiler: A flexible method of exposing privacy-related behavior in android applications to end users  13
AppProfiler: A flexible method of exposing privacy-related b...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Rosen, Sanae Qian, Zhiyun Morley Mao, Z. University of Michigan Ann Arbor MI United States
Although Android's permission system is intended to allow users to make informed decisions about their privacy, it is often ineffective at conveying meaningful, useful information on how a user's privacy might... 详细信息
来源: 评论
Exploring dependency for query privacy protection in location-based services  13
Exploring dependency for query privacy protection in locatio...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Chen, Xihui Pang, Jun Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg Luxembourg Faculty of Science Technology and Communication University of Luxembourg Luxembourg
Location-based services have been enduring a fast development for almost fifteen years. Due to the lack of proper privacy protection, especially in the early stage of the development, an enormous amount of user reques... 详细信息
来源: 评论
Accepting the inevitable: Factoring the user into home computer security  13
Accepting the inevitable: Factoring the user into home compu...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Urbanska, Malgorzata Roberts, Mark Ray, Indrajit Howe, Adele Byrne, Zinta Department of Computer Science Colorado State University Fort Collins CO 80523 United States Department of Psychology Colorado State University Fort Collins CO 80523 United States
Home computer users present unique challenges to computer security. A user's actions frequently affect security without the user understanding how. Moreover, whereas some home users are quite adept at protecting t... 详细信息
来源: 评论
Do online social network friends still threaten my privacy?  13
Do online social network friends still threaten my privacy?
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Labitzke, Sebastian Werling, Florian Mittag, Jens Hartenstein, Hannes Germany
A user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' priv... 详细信息
来源: 评论
Adaptive data protection in distributed sysems
Adaptive data protection in distributed sysems
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Squicciarini, Anna Cinzia Petracca, Giuseppe Bertino, Elisa College of Information Sciences and Technology Pennsylvania State University University Park PA 16802 United States Computer Science Department Purdue University West Lafayette IN 47906 United States
security is an important barrier to wide adoption of distributed systems for sensitive data storage and management. In particular, one unsolved problem is to ensure that customers data protection policies are honored,... 详细信息
来源: 评论
Geolocation of data in the cloud  13
Geolocation of data in the cloud
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Gondree, Mark Peterson, Zachary N. J. Naval Postgraduate School 1 University Circle Monterey CA 93940 United States
We introduce and analyze a general framework for authentically binding data to a location while providing strong assurances against cloud storage providers that (either accidentally or maliciously) attempt to relocate... 详细信息
来源: 评论
data usage control enforcement in distributed systems  13
Data usage control enforcement in distributed systems
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Kelbert, Florian Pretschner, Alexander Technische Universität München Garching bei München Germany
Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple co... 详细信息
来源: 评论
IBigTable: Practical data integrity for bigtable in public cloud  13
IBigTable: Practical data integrity for bigtable in public c...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Wei, Wei Yu, Ting Xue, Rui North Carolina State University 890 Oval Drive Raleigh NC United States Chinese Academy of Sciences State Key Lab. of Information Security Institute of Information Engineering China
BigTable is a distributed storage system that is designed to manage large-scale structured data. Deploying BigTable in a public cloud is an economic storage solution to small businesses and researchers who need to dea... 详细信息
来源: 评论
All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design  13
All your browser-saved passwords could belong to us: A secur...
收藏 引用
3rd acm conference on data and application security and privacy, codaspy 2013
作者: Zhao, Rui Yue, Chuan Department of Computer Science University of Colorado Colorado Springs Colorado Springs CO 80918 United States
Web users are confronted with the daunting challenges of creating, remembering, and using more and more strong passwords than ever before in order to protect their valuable assets on different websites. Password manag... 详细信息
来源: 评论