咨询与建议

限定检索结果

文献类型

  • 1,499 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,160 篇 工学
    • 1,085 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 323 篇 信息与通信工程
    • 143 篇 电气工程
    • 128 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 47 篇 网络空间安全
    • 45 篇 电子科学与技术(可...
    • 42 篇 动力工程及工程热...
    • 40 篇 生物医学工程(可授...
    • 36 篇 生物工程
    • 34 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 26 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 242 篇 理学
    • 170 篇 数学
    • 42 篇 生物学
    • 30 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 226 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 91 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 64 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 42 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 16 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 25 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,251 篇 英文
  • 278 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1531 条 记 录,以下是1071-1080 订阅
排序:
Why All this security? Teaching about privacy in a database Systems Course  17
Why All this Security? Teaching about Privacy in a Database ...
收藏 引用
17th Annual conference on Information Technology Education (SIGITE) and 5th Annual conference on Research in Information Technology (RIIT)
作者: Shichtman, Diane SUNY Empire State Coll 113 West Ave Saratoga Springs NY 12065 USA
A course in database systems offers the opportunity to help students understand, in a coherent way, the complete context of designing, implementing, and using a database. this presentation explores a module in an onli... 详细信息
来源: 评论
Automatic Summarization of privacy Policies using Ensemble Learning  16
Automatic Summarization of Privacy Policies using Ensemble L...
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Tomuro, Noriko Lytinen, Steven Hornsburg, Kurt Depaul Univ Coll Comp & Digital Media CDM Chicago IL 60604 USA MobileEvolution Vienna Austria
When customers purchase a product or sign up for service from a company, they often are required to agree to a privacy Policy or Terms of Service agreement. Many of these policies are lengthy, and a typical customer a... 详细信息
来源: 评论
An Authorization Service for Collaborative Situation Awareness  16
An Authorization Service for Collaborative Situation Awarene...
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Egner, Alexandru Ionut Duc Luu Den Hartog, Jerry Zannone, Nicola Eindhoven Univ Technol NL-5600 MB Eindhoven Netherlands
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, as they are sensitive by nature, and, t... 详细信息
来源: 评论
Decoding the Mystery of the Internet of things  16
Decoding the Mystery of the Internet of Things
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Voas, Jeffrey NIST 100 Bur DrMS 8930 Gaithersburg MD 20899 USA
System primitives allow formalisms, reasoning, simulations, and reliability and security risk-tradeoffs to be formulated and argued. In this work, six core primitives belonging to most distributed systems are presente... 详细信息
来源: 评论
TTPP method for validation of k-anonymity on wi-fi association log data: poster  17
TTPP method for validation of k-anonymity on wi-fi associati...
收藏 引用
proceedings of the 10th acm conference on security and privacy in Wireless and Mobile Networks
作者: Akinobu Fukuzaki Noriaki Koide Noboru Sonehara National Institute of Informatics Tokyo Japan Tsuda University Tokyo Japan
Using data about individuals without revealing sensitive information about them is important. In recently years, a new privacy protection concept is called k-anonymity has been introduced. On the other hand, applicati... 详细信息
来源: 评论
Efficient Network Path Verification for Policy-routed Queries  16
Efficient Network Path Verification for Policy-routed Querie...
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Karumanchi, Sushama Li, Jingwei Squicciarini, Anna Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA Nankai Univ Coll Comp & Control Engn Tianjin Peoples R China
Resource discovery in unstructured peer-to-peer networks causes a search query to be flooded throughout the network via random nodes, leading to security and privacy issues. the owner of the search query does not have... 详细信息
来源: 评论
DIVERSITY  16
DIVERSITY
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Knight, John Univ Virginia Charlottesville VA 22903 USA
No abstract available.
来源: 评论
Fog Computing: Common security Issues and Proposed Countermeasures  5
Fog Computing: Common Security Issues and Proposed Counterme...
收藏 引用
5th International conference System Modeling and Advancement in Research Trends (SMART)
作者: Kumar, Praveen Zaidi, Nabeel Choudhury, Tanupriya Amity Univ Noida Uttar Pradesh India
Fog computing is one of the most important paradigms used in modern world as an extension to cloud computing. Like Cloud Computing, it provides data storage, manipulation and computation of data, but to the edge of th... 详细信息
来源: 评论
proceedings of the 5th International Cryptology and Information security conference 2016, CRYPTOLOGY 2016
Proceedings of the 5th International Cryptology and Informat...
收藏 引用
5th International Cryptology and Information security conference 2016, CRYPTOLOGY 2016
the proceedings contain 24 papers. the topics discussed include: a comparative s-index in factoring RSA modulus via Lucas sequences;families of cyclotomic cosets with application to secret sharing scheme;families of c...
来源: 评论
security Constraints in Temporal Role-Based Access-Controlled Workflows  16
Security Constraints in Temporal Role-Based Access-Controlle...
收藏 引用
6th acm conference on data and application security and privacy (CODASPY)
作者: Combi, Carlo Vigano, Luca Zavatteri, Matteo Univ Verona Dipartimento Informat I-37100 Verona Italy Kings Coll London Dept Informat London WC2R 2LS England
Workflows and role-based access control models need to be suitably merged, in order to allow users to perform processes in a correct way, according to the given data access policies and the temporal constraints. Given... 详细信息
来源: 评论