咨询与建议

限定检索结果

文献类型

  • 46 篇 会议

馆藏范围

  • 46 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 36 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 8 篇 信息与通信工程
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 理学
    • 6 篇 数学
    • 1 篇 生物学
  • 4 篇 管理学
    • 3 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 军事学

主题

  • 4 篇 sensitive data
  • 4 篇 security
  • 2 篇 static analysis
  • 2 篇 network security
  • 2 篇 cloud computing
  • 2 篇 privacy
  • 1 篇 pattern mining
  • 1 篇 intrusion detect...
  • 1 篇 iot devices
  • 1 篇 health
  • 1 篇 role-based acces...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 bindiff
  • 1 篇 human behavior
  • 1 篇 graph database
  • 1 篇 interoperability
  • 1 篇 data privacy
  • 1 篇 smartphones
  • 1 篇 barbican

机构

  • 1 篇 department of co...
  • 1 篇 univ tokyo bunky...
  • 1 篇 stevens inst tec...
  • 1 篇 the pennsylvania...
  • 1 篇 qinghai universi...
  • 1 篇 university of mi...
  • 1 篇 school of electr...
  • 1 篇 kth royal inst t...
  • 1 篇 purdue universit...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 politehnica univ...
  • 1 篇 school of comput...
  • 1 篇 university of lu...
  • 1 篇 fraunhofer aisec...
  • 1 篇 ibm tj watson re...
  • 1 篇 vtt technical re...
  • 1 篇 umass boston uni...
  • 1 篇 bionym inc. on
  • 1 篇 gh raisoni coll ...

作者

  • 2 篇 rizvi syed zain ...
  • 2 篇 islam mohammad s...
  • 2 篇 rughinis razvan
  • 2 篇 ghinita gabriel
  • 2 篇 maiti rajib ranj...
  • 2 篇 kuzu mehmet
  • 2 篇 fong philip w. l...
  • 2 篇 kantarcioglu mur...
  • 1 篇 hsiao shou-ching
  • 1 篇 sistla a. prasad
  • 1 篇 le traon yves
  • 1 篇 litton jan-eric
  • 1 篇 guanyu tian
  • 1 篇 madhavan krishna
  • 1 篇 lovat enrico
  • 1 篇 li yingjiu
  • 1 篇 forg fabian
  • 1 篇 saji nobuyuki
  • 1 篇 michael mitchell
  • 1 篇 chen shanji

语言

  • 46 篇 英文
检索条件"任意字段=4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014"
46 条 记 录,以下是41-50 订阅
排序:
Session details: Novel techniques for data security  14
Session details: Novel techniques for data security
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Adam J. Lee University of Pittsburgh
No abstract available.
来源: 评论
Session details: Mobile security  14
Session details: Mobile security
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Debin Gao Singapore Management University
No abstract available.
来源: 评论
Session details: Web security  14
Session details: Web security
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Anna Squicciarini The Pennsylvania State University
No abstract available.
来源: 评论
Shared responsibility is better than no responsibility: federated encryption in the cloud  14
Shared responsibility is better than no responsibility: fede...
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Jarret Raim Rackspace San Antonio TX USA
the process of encrypting data for Cloud services is usually presented two ways. the data owner can encrypt it themselves or rely on the service provider to do so. On one hand, we have significant security, but high-c... 详细信息
来源: 评论
Virtualization and security: happily ever after?  14
Virtualization and security: happily ever after?
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Dongyan Xu Purdue University West Lafayette IN USA
Virtualization has been a major enabling technology for improving trustworthiness and tamper-resistance of computer security functions. In the past decade, we have witnessed the development of virtualization-based tec... 详细信息
来源: 评论
Systematic audit of third-party android phones  14
Systematic audit of third-party android phones
收藏 引用
Proceedings of the 4th acm conference on data and application security and privacy
作者: Michael Mitchell Guanyu Tian Zhi Wang Florida State University Tallahassee FL USA
Android has become the leading smartphone platform with hundreds of devices from various manufacturers available on the market today. All these phones closely resemble each other with similar hardware and software fea... 详细信息
来源: 评论