咨询与建议

限定检索结果

文献类型

  • 46 篇 会议

馆藏范围

  • 46 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 36 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 8 篇 信息与通信工程
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 理学
    • 6 篇 数学
    • 1 篇 生物学
  • 4 篇 管理学
    • 3 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 军事学

主题

  • 4 篇 sensitive data
  • 4 篇 security
  • 2 篇 static analysis
  • 2 篇 network security
  • 2 篇 cloud computing
  • 2 篇 privacy
  • 1 篇 pattern mining
  • 1 篇 intrusion detect...
  • 1 篇 iot devices
  • 1 篇 health
  • 1 篇 role-based acces...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 bindiff
  • 1 篇 human behavior
  • 1 篇 graph database
  • 1 篇 interoperability
  • 1 篇 data privacy
  • 1 篇 smartphones
  • 1 篇 barbican

机构

  • 1 篇 department of co...
  • 1 篇 univ tokyo bunky...
  • 1 篇 stevens inst tec...
  • 1 篇 the pennsylvania...
  • 1 篇 qinghai universi...
  • 1 篇 university of mi...
  • 1 篇 school of electr...
  • 1 篇 kth royal inst t...
  • 1 篇 purdue universit...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 politehnica univ...
  • 1 篇 school of comput...
  • 1 篇 university of lu...
  • 1 篇 fraunhofer aisec...
  • 1 篇 ibm tj watson re...
  • 1 篇 vtt technical re...
  • 1 篇 umass boston uni...
  • 1 篇 bionym inc. on
  • 1 篇 gh raisoni coll ...

作者

  • 2 篇 rizvi syed zain ...
  • 2 篇 islam mohammad s...
  • 2 篇 rughinis razvan
  • 2 篇 ghinita gabriel
  • 2 篇 maiti rajib ranj...
  • 2 篇 kuzu mehmet
  • 2 篇 fong philip w. l...
  • 2 篇 kantarcioglu mur...
  • 1 篇 hsiao shou-ching
  • 1 篇 sistla a. prasad
  • 1 篇 le traon yves
  • 1 篇 litton jan-eric
  • 1 篇 guanyu tian
  • 1 篇 madhavan krishna
  • 1 篇 lovat enrico
  • 1 篇 li yingjiu
  • 1 篇 forg fabian
  • 1 篇 saji nobuyuki
  • 1 篇 michael mitchell
  • 1 篇 chen shanji

语言

  • 46 篇 英文
检索条件"任意字段=4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014"
46 条 记 录,以下是31-40 订阅
排序:
Inference attack against encrypted range queries on outsourced databases  14
Inference attack against encrypted range queries on outsourc...
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Islam, Mohammad Saiful Kuzu, Mehmet Kantarcioglu, Murat Computer Science Department University of Texas at Dallas United States
To mitigate security concerns of outsourced databases, quite a few protocols have been proposed that outsource data in encrypted format and allow encrypted query execution on the server side. Among the more practical ... 详细信息
来源: 评论
Efficient privacy-aware search over encrypted databases  14
Efficient privacy-aware search over encrypted databases
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Kuzu, Mehmet Islam, Mohammad Saiful Kantarcioglu, Murat Department of Computer Science University of Texas at Dallas Richardson TX United States
In recent years, database as a service (DAS) model where data management is outsourced to cloud service providers has become more prevalent. Although DAS model offers lower cost and flexibility, it necessitates the tr... 详细信息
来源: 评论
OASIS: Operational access sandboxes for information security  4
OASIS: Operational access sandboxes for information security
收藏 引用
4th acm Workshop on security and privacy in Smartphones and Mobile Devices, SPSM 2014, Held in Association with the 21st acm conference on Computer and Communications security, CCS 2014
作者: Conti, Mauro Fernandes, Earlence Paupore, Justin Simionato, Daniel Università di Padova Padova Italy University of Michigan Ann ArborMI United States
Android's permission system follows an "all or nothing" approach when installing an application. the end user has no way to know how the permissions are actually used by the application, and how the sens... 详细信息
来源: 评论
Cassandra: Towards a certifying app store for android  4
Cassandra: Towards a certifying app store for android
收藏 引用
4th acm Workshop on security and privacy in Smartphones and Mobile Devices, SPSM 2014, Held in Association with the 21st acm conference on Computer and Communications security, CCS 2014
作者: Lortz, Steffen Mantel, Heiko Starostin, Artem Bähr, Timo Schneider, David Weber, Alexandra Computer Science Department TU Darmstadt Germany
Modern mobile devices store and process an abundance of data. Although many users consider some of this data as private, they do not yet obtain satisfactory support for con- Trolling what applications might do with th... 详细信息
来源: 评论
privacy threat Modeling for Emerging BiobankClouds  5
Privacy Threat Modeling for Emerging BiobankClouds
收藏 引用
4th International conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICth)
作者: Gholami, Ali Lind, Anna-Sara Reichel, Jane Litton, Jan-Eric Edlund, Ake Laure, Erwin KTH Royal Inst Technol HPCViz Stockholm Sweden Uppsala Univ Fac Law & Ctr Res Ethics & Bioeth Uppsala Sweden Karolinska Inst Med Epidemiol & Biostatist Stockholm Sweden
there is an increased amount of data produced by next generation sequencing (NGS) machines which demand scalable storage and analysis of genomic data. In order to cope with this huge amount of information, many bioban... 详细信息
来源: 评论
Demo: TrustEYE.M4 - A novel platform for secure visual sensor network applications  14
Demo: TrustEYE.M4 - A novel platform for secure visual senso...
收藏 引用
8th acm/IEEE International conference on Distributed Smart Cameras, ICDSC 2014
作者: Winkler, thomas Rinner, Bernhard Institute of Networked and Embedded Systems Lakeside Labs Alpen-Adria-Universität Klagenfurt Lakeside Park B02b Klagenfurt9020 Austria
Designers of Visual Sensor Network (VSN) platforms face many challenges. Image sensors deliver large amounts of data and substantial computing power and memory are required for processing. At the same time power consu... 详细信息
来源: 评论
data aggregation based on saving energy and preserving privacy in wireless sensor networks  4
Data aggregation based on saving energy and preserving priva...
收藏 引用
4th International conference on Advanced Design and Manufacturing Engineering, ADME 2014
作者: Shan, Gui Jun School of Electronic Information Jiangsu University of Science and Technology Zhenjiang China School of Electronic and Information Zhenjiang College Zhenjiang China
privacy preserving plays an important role in application of the Internet of things (IoT). As apart of the IT, Wireless Sensor Networks (WSNs) should provide the privacy preserving in data aggregation. this paper pres... 详细信息
来源: 评论
Overview of CDAMA Scheme in Wireless Sensor Network Using DAS Model
Overview of CDAMA Scheme in Wireless Sensor Network Using DA...
收藏 引用
4th International conference on Communication Systems and Network Technologies (CSNT)
作者: Mouje, Nidhi Chavhan, Nikita GH Raisoni Coll Engn & Technol Dept Comp Sci & Engn Nagpur Maharashtra India
data aggregation in Wireless Sensor Network refers to acquiring the sensed data from the sensors to the gateway node. data aggregation scheme minimize a large amount of transmission data to the base station, so that i... 详细信息
来源: 评论
Session details: Novel techniques for application security  14
Session details: Novel techniques for application security
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Barbara Carminati University of Insubria
No abstract available.
来源: 评论
Session details: privacy preserving techniques  14
Session details: Privacy preserving techniques
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Murat Kantarcioglu University of Texas at Dallas
No abstract available.
来源: 评论