咨询与建议

限定检索结果

文献类型

  • 43 篇 会议

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 28 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 6 篇 信息与通信工程
    • 3 篇 电气工程
    • 3 篇 安全科学与工程
    • 2 篇 控制科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 7 篇 管理学
    • 5 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 6 篇 理学
    • 6 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 4 篇 privacy
  • 3 篇 machine learning
  • 3 篇 mobile security
  • 2 篇 access control
  • 2 篇 big data
  • 2 篇 androids
  • 2 篇 sensitive data
  • 2 篇 static analysis
  • 2 篇 security
  • 1 篇 obstruction
  • 1 篇 consumers
  • 1 篇 human behavior
  • 1 篇 data privacy
  • 1 篇 privacy policy
  • 1 篇 linux
  • 1 篇 smartphones
  • 1 篇 security model
  • 1 篇 business process
  • 1 篇 one time passwor...
  • 1 篇 cryptography mis...

机构

  • 2 篇 computer science...
  • 2 篇 google inc. irvi...
  • 1 篇 natl res univ hi...
  • 1 篇 department of ps...
  • 1 篇 linköping univer...
  • 1 篇 univ tokyo bunky...
  • 1 篇 mobileevolution ...
  • 1 篇 dept. of electri...
  • 1 篇 key laboratory o...
  • 1 篇 ericsson secur r...
  • 1 篇 astar inst infoc...
  • 1 篇 north carolina s...
  • 1 篇 dept. of compute...
  • 1 篇 university of pi...
  • 1 篇 snt university o...
  • 1 篇 department of co...
  • 1 篇 unc dept comp sc...
  • 1 篇 university of pa...
  • 1 篇 mitsubishi elect...
  • 1 篇 purdue universit...

作者

  • 2 篇 shu xiaokui
  • 2 篇 yao danfeng daph...
  • 2 篇 krishnan ram
  • 2 篇 ravishankar chin...
  • 2 篇 sandhu ravi
  • 2 篇 dautrich jonatha...
  • 1 篇 crispo bruno
  • 1 篇 hu xiaohan
  • 1 篇 günter karjoth
  • 1 篇 jiang rong
  • 1 篇 li xiong
  • 1 篇 lee adam j.
  • 1 篇 li yingjiu
  • 1 篇 saji nobuyuki
  • 1 篇 carlsson niklas
  • 1 篇 hornsburg kurt
  • 1 篇 feng wu-chun
  • 1 篇 patel hiren
  • 1 篇 ahmadi mansour
  • 1 篇 bharavi mishra

语言

  • 43 篇 英文
检索条件"任意字段=5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015"
43 条 记 录,以下是41-50 订阅
排序:
Relationship-based information sharing in cloud-based Decentralized Social Networks  14
Relationship-based information sharing in cloud-based Decent...
收藏 引用
4th acm conference on data and application security and privacy, codaspy 2014
作者: Albertini, Davide Alberto Carminati, Barbara DISTA Università Degli Studi Dell'Insubria Via Mazzini 5 Varese Italy
Commercial OSNs have started to provide users with the ability to set their privacy settings for a more controlled information sharing. However, these settings do not prevent the social network manager to perform mark... 详细信息
来源: 评论
Collecting, Analyzing and Responding to Enterprise Scale DNS Events  15
Collecting, Analyzing and Responding to Enterprise Scale DNS...
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: William Horne Hewlett-Packard Laboratories Princeton NJ USA
DNS is an important data source for security for many reasons. If the DNS infrastructure can be brought down, many networking tasks would be impossible to complete. If the integrity of the mapping between domain names... 详细信息
来源: 评论
Aligning security and Business Objectives for Process-Aware Information Systems  15
Aligning Security and Business Objectives for Process-Aware ...
收藏 引用
Proceedings of the 5th acm conference on data and application security and privacy
作者: Günter Karjoth Lucerne University of Applied Sciences and Arts Lucerne Switzerland
Enterprises are increasingly subject to compliance rules that originate from corporate guidelines, industry sector standards, and laws. the goal of access control is to protect against unauthorized users. However, thr... 详细信息
来源: 评论