咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 1 册 图书

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 41 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 5 篇 信息与通信工程
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 6 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 6 篇 security
  • 6 篇 privacy
  • 4 篇 differential pri...
  • 2 篇 secret sharing
  • 2 篇 homomorphic encr...
  • 2 篇 data privacy
  • 2 篇 spoofing
  • 2 篇 web security
  • 1 篇 iso
  • 1 篇 life cycle asses...
  • 1 篇 internet of thin...
  • 1 篇 dropbox
  • 1 篇 smart homes
  • 1 篇 intrusion detect...
  • 1 篇 traffic analysis
  • 1 篇 lattice-based cr...
  • 1 篇 trust models
  • 1 篇 graphs
  • 1 篇 hijacking
  • 1 篇 scalability

机构

  • 2 篇 north carolina s...
  • 1 篇 fdn bruno kessle...
  • 1 篇 telfer school of...
  • 1 篇 univ coimbra cis...
  • 1 篇 stevens inst tec...
  • 1 篇 public research ...
  • 1 篇 univ toronto on
  • 1 篇 school of cybers...
  • 1 篇 inst technol & s...
  • 1 篇 seeburger ag 6 g...
  • 1 篇 us mil acad dept...
  • 1 篇 ecole polytech f...
  • 1 篇 univ roma la sap...
  • 1 篇 swiss fed inst t...
  • 1 篇 umass boston bos...
  • 1 篇 univ waterloo ec...
  • 1 篇 florida polytech...
  • 1 篇 soochow univ peo...
  • 1 篇 school of comput...
  • 1 篇 univ illinois ur...

作者

  • 2 篇 enck william
  • 1 篇 samet saeed
  • 1 篇 kostiainen kari
  • 1 篇 sharma anupam
  • 1 篇 poupart claude
  • 1 篇 baldoni roberto
  • 1 篇 balmau oana
  • 1 篇 gu xiaohui
  • 1 篇 egecioglu omer
  • 1 篇 fragopoulou para...
  • 1 篇 capkun srdjan
  • 1 篇 wang xiao
  • 1 篇 forg fabian
  • 1 篇 mannan mohammad
  • 1 篇 petrova-antonova...
  • 1 篇 el abbadi amr
  • 1 篇 che jiazhen
  • 1 篇 durand arnaud
  • 1 篇 ahmadi mansour
  • 1 篇 wehrle klaus

语言

  • 45 篇 英文
检索条件"任意字段=7th ACM Conference on Data and Application Security and Privacy, CODASPY 2017"
45 条 记 录,以下是21-30 订阅
排序:
privacy-Preserving HMM Forward Computation  17
Privacy-Preserving HMM Forward Computation
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Ziegeldorf, Jan Henrik Metzke, Jan Rueth, Jan Henze, Martin Wehrle, Klaus Rhein Westfal TH Aachen Commun & Distributed Syst COMSYS Aachen Germany
In many areas such as bioinformatics, pattern recognition, and signal processing, Hidden Markov Models (HMMs) have become an indispensable statistical tool. A fundamental building block for these applications is the F... 详细信息
来源: 评论
A Study of security Vulnerabilities on Docker Hub  17
A Study of Security Vulnerabilities on Docker Hub
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Shu, Rui Gu, Xiaohui Enck, William North Carolina State Univ Raleigh NC 27695 USA
Docker containers have recently become a popular approach to provision multiple applications over shared physical hosts in a more lightweight fashion than traditional virtual machines. this popularity has led to the c... 详细信息
来源: 评论
Discovering Browser Extensions via Web Accessible Resources  17
Discovering Browser Extensions via Web Accessible Resources
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Sjosten, Alexander Van Acker, Steven Sabelfeld, Andrei Chalmers Univ Technol Gothenburg Sweden
Browser extensions provide a powerful platform to enrich browsing experience. At the same time, they raise important security questions. From the point of view of a website, some browser extensions are invasive, remov... 详细信息
来源: 评论
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web applications  17
Sound and Static Analysis of Session Fixation Vulnerabilitie...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Amira, Abdelouahab Ouadjaout, Abdelraouf Derhab, Abdelouahid Badache, Nadjib CERIST Res Ctr Sci & Tech Informat Algiers Algeria A MIRA Univ Bejaia Algeria Univ Paris 06 LIP6 Paris France King Saud Univ Ctr Excellence Informat Assurance CoEIA Riyadh Saudi Arabia
Web applications use authentication mechanisms to provide user-friendly content to users. However, some dangerous techniques like session fixation attacks target these mechanisms, by making the legitimate user use a s... 详细信息
来源: 评论
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware  17
DroidSieve: Fast and Accurate Classification of Obfuscated A...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Suarez-Tangil, Guillermo Dash, Santanu Kumar Ahmadi, Mansour Kinder, Johannes Giacinto, Giorgio Cavallaro, Lorenzo Royal Holloway Univ London London England Univ Cagliari Cagliari Italy
With more than two million applications, Android marketplaces require automatic and scalable methods to efficiently vet apps for the absence of malicious threats. Recent techniques have successfully relied on the extr... 详细信息
来源: 评论
Graph Automorphism-Based, Semantics-Preserving security for the Resource Description Framework (RDF)  17
Graph Automorphism-Based, Semantics-Preserving Security for ...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Lin, Zhiyuan Tripunitara, Mahesh Univ Waterloo ECE Waterloo ON Canada
We address security in the context of the Resource Description Framework (RDF), a graph-like data model for the web. One of RDF's compelling features is a precise, model-theoretic semantics. We first propose a thr... 详细信息
来源: 评论
Share a pie? privacy-Preserving Knowledge Base Export through Count-min Sketches  17
<i>Share a pie</i>? Privacy-Preserving Knowledge Base Export...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Ucci, Daniele Aniello, Leonardo Baldoni, Roberto Univ Roma La Sapienza Res Ctr Cyber Intelligence & Informat Secur CIS Dept Comp Control & Management Engn Antonio Ruber Rome Italy
Knowledge base (KB) sharing among parties has been proven to be beneficial in several scenarios. However such sharing can arise considerable privacy concerns depending on the sensitivity of the information stored in e... 详细信息
来源: 评论
Prioritized Analysis of Inter-App Communication Risks  17
Prioritized Analysis of Inter-App Communication Risks
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Liu, Fang Cai, Haipeng Wang, Gang Yao, Danfeng (Daphne) Elish, Karim O. Ryder, Barbara G. Virginia Tech Dept Comp Sci Blacksburg VA 24061 USA Washington State Univ Sch Elect Engn & Comp Sci Pullman WA 99164 USA Florida Polytech Univ Dept Comp Sci Lakeland FL USA
Inter-Component Communication (ICC) enables useful interactions between mobile apps. However, misuse of ICC exposes users to serious threats such as intent hijacking/spoofing and app collusions, allowing malicious app... 详细信息
来源: 评论
Achieving Differential privacy in Secure Multiparty data Aggregation Protocols on Star Networks  17
Achieving Differential Privacy in Secure Multiparty Data Agg...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Bindschaedler, Vincent Rane, Shantanu Brito, Alejandro E. Rao, Vanishree Uzun, Ersin Univ Illinois Urbana IL 61801 USA Palo Alto Res Ctr Palo Alto CA USA
We consider the problem of privacy-preserving data aggregation in a star network topology, i.e., several untrusting participants connected to a single aggregator. We require that the participants do not discover each ... 详细信息
来源: 评论
"If You Can't Beat them, Join them": A Usability Approach to Interdependent privacy in Cloud Apps  17
"If You Can't Beat them, Join them": A Usability Approach to...
收藏 引用
7th acm conference on data and application security and privacy (codaspy)
作者: Harkous, Hamza Aberer, Karl Ecole Polytech Fed Lausanne Lausanne Switzerland
Cloud storage services, like Dropbox and Google Drive, have growing ecosystems of 3rd party apps that are designed to work with users' cloud files. Such apps often request full access to users' files, includin... 详细信息
来源: 评论