咨询与建议

限定检索结果

文献类型

  • 43 篇 会议

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 28 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 6 篇 信息与通信工程
    • 3 篇 电气工程
    • 3 篇 安全科学与工程
    • 2 篇 控制科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 7 篇 管理学
    • 5 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 6 篇 理学
    • 6 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 4 篇 privacy
  • 3 篇 machine learning
  • 3 篇 mobile security
  • 2 篇 access control
  • 2 篇 big data
  • 2 篇 androids
  • 2 篇 sensitive data
  • 2 篇 static analysis
  • 2 篇 security
  • 1 篇 obstruction
  • 1 篇 consumers
  • 1 篇 human behavior
  • 1 篇 data privacy
  • 1 篇 privacy policy
  • 1 篇 linux
  • 1 篇 smartphones
  • 1 篇 security model
  • 1 篇 business process
  • 1 篇 one time passwor...
  • 1 篇 cryptography mis...

机构

  • 2 篇 computer science...
  • 2 篇 google inc. irvi...
  • 1 篇 natl res univ hi...
  • 1 篇 department of ps...
  • 1 篇 linköping univer...
  • 1 篇 univ tokyo bunky...
  • 1 篇 mobileevolution ...
  • 1 篇 dept. of electri...
  • 1 篇 key laboratory o...
  • 1 篇 ericsson secur r...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 dept. of compute...
  • 1 篇 university of pi...
  • 1 篇 snt university o...
  • 1 篇 department of co...
  • 1 篇 unc dept comp sc...
  • 1 篇 university of pa...
  • 1 篇 mitsubishi elect...
  • 1 篇 purdue universit...

作者

  • 2 篇 shu xiaokui
  • 2 篇 yao danfeng daph...
  • 2 篇 krishnan ram
  • 2 篇 ravishankar chin...
  • 2 篇 sandhu ravi
  • 2 篇 dautrich jonatha...
  • 1 篇 crispo bruno
  • 1 篇 hu xiaohan
  • 1 篇 günter karjoth
  • 1 篇 jiang rong
  • 1 篇 li xiong
  • 1 篇 lee adam j.
  • 1 篇 li yingjiu
  • 1 篇 saji nobuyuki
  • 1 篇 carlsson niklas
  • 1 篇 hornsburg kurt
  • 1 篇 feng wu-chun
  • 1 篇 patel hiren
  • 1 篇 ahmadi mansour
  • 1 篇 bharavi mishra

语言

  • 43 篇 英文
检索条件"任意字段=5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015"
43 条 记 录,以下是21-30 订阅
排序:
StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications  15
StaDynA: Addressing the problem of dynamic code updates in t...
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: Zhauniarovich, Yury Ahmad, Maqsood Gadyatskaya, Olga Crispo, Bruno Massacci, Fabio University of Trento Trento Italy SnT University of Luxembourg Luxembourg Luxembourg DistriNet KU Leuven Leuven Belgium
Static analysis of Android applications can be hindered by the presence of the popular dynamic code update techniques: dynamic class loading and reflection. Recent Android mal- ware samples do actually use these mecha... 详细信息
来源: 评论
CryptStream: Cryptographic access controls for streaming data  15
CryptStream: Cryptographic access controls for streaming dat...
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: thoma, Cory Lee, Adam J. Labrinidis, Alexandros University of Pittsburgh PittsburghPA15260 United States
With data becoming available in larger quantities and at higher rates, new data processing paradigms have been pro- posed to handle large and fast data. data Stream Processing is one such paradigm wherein transient da... 详细信息
来源: 评论
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis  15
Can't you hear me knocking: Identification of user actions o...
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: Conti, Mauro Mancini, Luigi V. Spolaor, Riccardo Verde, Nino V. University of Padua Padua Italy Sapienza University of Rome Rome Italy
While smartphone usage become more and more pervasive, people start also asking to which extent such devices can be maliciously exploited as "tracking devices". the concern is not only related to an adversar... 详细信息
来源: 评论
Virtual resource orchestration constraints in cloud infrastructure as a service  15
Virtual resource orchestration constraints in cloud infrastr...
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: Bijon, Khalid Krishnan, Ram Sandhu, Ravi Institute for Cyber Security Univ of Texas at San Antonio United States
In an infrastructure as a service (IaaS) cloud, virtualized IT resources such as compute, storage and network are offered on demand by a cloud service provider (CSP) to its tenants (customers). A major problem for ent... 详细信息
来源: 评论
Tunably-oblivious memory: Generalizing ORAM to enable privacy-efficiency tradeoffs  15
Tunably-oblivious memory: Generalizing ORAM to enable privac...
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: Dautrich, Jonathan Ravishankar, Chinya Google Inc. IrvineCA United States Computer Science and Engineering University of California Riverside United States
We consider the challenge of providing privacy-preserving access to data outsourced to an untrusted cloud provider. Even if data blocks are encrypted, access patterns may leak valuable information. Oblivious RAM (ORAM... 详细信息
来源: 评论
Dimensions of risk in mobile applications: A user study  15
Dimensions of risk in mobile applications: A user study
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: Jorgensen, Zach Chen, Jing Gates, Christopher S. Li, Ninghui Proctor, Robert W. Yu, Ting Department of Computer Science North Carolina State University RaleighNC United States Department of Psychological Sciences CERIAS Purdue University West LafayetteIN United States Department of Computer Science CERIAS Purdue University West LafayetteIN United States Qatar Computing Research Institute Doha Qatar
Mobile platforms, such as Android, warn users about the permissions an app requests and trust that the user will make the correct decision about whether or not to install the app. Unfortunately many users either ignor... 详细信息
来源: 评论
Distributed search over encrypted big data  15
Distributed search over encrypted big data
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: Kuzu, Mehmet Islam, Mohammad Saiful Kantarcioglu, Murat Department of Computer Science University of Texas at Dallas RichardsonTX United States
Nowadays, huge amount of documents are increasingly trans- ferred to the remote servers due to the appealing features of cloud computing. On the other hand, privacy and se- curity of the sensitive information in untru... 详细信息
来源: 评论
DetAnom: Detecting anomalous database transactions by insiders  15
DetAnom: Detecting anomalous database transactions by inside...
收藏 引用
5th acm conference on data and application security and privacy, codaspy 2015
作者: Hussain, Syed Rafiul Sallam, Asmaa Bertino, Elisa Dept. of Computer Science Purdue University United States Dept. of Computer Science Cyber Center Purdue University United States
databaseManagement Systems (DBMSs) provide access con- trol mechanisms that allow database administrators (DBA) to grant application programs access privileges to databases. However, securing the database alone is not... 详细信息
来源: 评论
A privacy Enhanced security Framework for Android Users  5
A Privacy Enhanced Security Framework for Android Users
收藏 引用
5th International conference on IT Convergence and security (ICITCS)
作者: Singh, Shirish Kumar Mishra, Bharavi Gera, Poonam LNM Inst Informat Technol Comp Sci & Engn Dept Jaipur Rajasthan India
In the past few years, the primary focus of computing has shifted from PCs to smart-phones and tablets. As a result, smart-phones have become more than a communication device, now it can store vast amount of users sen... 详细信息
来源: 评论
security of Web applications with short web service : a review Study  5
Security of Web Applications with short web service : a revi...
收藏 引用
5th International conference on Advanced Computing & Communication Technologies (ACCT)
作者: Ajay, Anadi Jaiswal, Arunima Verma, Kritika Amity Univ Comp Sci & Engn Noida 201313 India Amity Univ Noida 201313 India
Web application (WA) is considered as a secured communication different users. Whereas the data that can be held by the SMS is very limited (short) therefore it is called Short Messaging Service. At the SMS follow web... 详细信息
来源: 评论