咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1251-1260 订阅
排序:
Ghost encryption: Mobile data security model encrypting data before moving it to the cloud service provider  5
Ghost encryption: Mobile data security model encrypting data...
收藏 引用
5th International conference on Advanced Computing, ICoAC 2013
作者: Armel, Arokia Susai Raja thavavel, V. Dept. of Computer Applications Karunya University Coimbatore 641 114 India
Cloud Computing is the current technology that revolutionize the mobile and IT industry. Most of the mobile vendors are providing extended data storage over the cloud either with the third party cloud service provider... 详细信息
来源: 评论
SEGS 2013 - proceedings of the 2013 acm Workshop on Smart Energy Grid security, Co-located with CCS 2013
SEGS 2013 - Proceedings of the 2013 ACM Workshop on Smart En...
收藏 引用
2013 1st acm Workshop on Smart Energy Grid security, SEGS 2013, Held in Conjunction with the 20th acm conference on Computer and Communications security, CCS 2013
the proceedings contain 12 papers. the topics discussed include: a security protocol for information-centric networking in smart grids;DLMS/COSEM security level enhancement to construct secure advanced metering infras...
来源: 评论
INTEGRATED SECURE WATERMARK DETECTION AND privacy PRESERVING STORAGE IN thE COMPRESSIVE SENSING DOMAIN
INTEGRATED SECURE WATERMARK DETECTION AND PRIVACY PRESERVING...
收藏 引用
5th IEEE International Workshop on Information Forensics and security (WIFS)
作者: Wang, Qia Zeng, Wenjun Tian, Jun Univ Missouri Dept Comp Sci Columbia MO 65211 USA Futurewei Technol Bridgewater MA 08807 USA
Secure watermark detection techniques are important to protect the secrecy of the watermark pattern. In this paper, we identify an application scenario that requires performing secure watermark detection in the cloud,... 详细信息
来源: 评论
An auditing mechanism for the security of service in grid
An auditing mechanism for the security of service in grid
收藏 引用
5th IEEE International conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Liu, Zhusong Sun, Sheng Li, Yunfa Faculty of Computer Guangdong University of Technology Guangzhou China School of Computer Hangzhou Dianzi University Hangzhou China
With the growth of system scale, it has become very difficult problem that how to ensure the security of service in grid. In order to resolve this problem, we propose an auditing mechanism for the security of service ... 详细信息
来源: 评论
V-MLR: A multilevel security model for virtualization
V-MLR: A multilevel security model for virtualization
收藏 引用
5th IEEE International conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Zhu, Hui Xue, Yingfang Zhang, Yun Chen, Xiaofeng Li, Hui Liu, Ximeng State Key Laboratory of Integrated Service Networks China Network and Data Security Key Laboratory of Sichuan Province Xidian University Xi'an China
As the infrastructure of cloud computing, the virtualization security problem has become more severe since the security requirement of different virtual machines (VMs) may conflict with the others in could computing p... 详细信息
来源: 评论
Implementing database Access Control Policy from Unconstrained Natural Language Text
Implementing Database Access Control Policy from Unconstrain...
收藏 引用
35th International conference on Software Engineering (ICSE)
作者: Slankas, John N Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
Although software can and does implement access control at the application layer, failure to enforce data access at the data layer often allows uncontrolled data access when individuals bypass application controls. th... 详细信息
来源: 评论
the security analysis of data re-encryption model in cloud services
The security analysis of data re-encryption model in cloud s...
收藏 引用
2013 5th International conference on Computational and Information Sciences, ICCIS 2013
作者: Gu, Xin Xu, Zhengquan Xiong, Lizhi Feng, Chunhui State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University No.129 Luoyu Road Wuhan Hubei China
Cloud computing provides both opportunities to develop more services as well as significant risks for greater exposure to data privacy problem when users outsource sensitive data for sharing on cloud servers. Re-encry... 详细信息
来源: 评论
Secure cloud file system with attribute based encryption
Secure cloud file system with attribute based encryption
收藏 引用
5th IEEE International conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Zhu, Shuaishuai Yang, Xiaoyuan Wu, XuGuang Network and Information Security Key Laboratory Electronics Department Engineering University of the Armed Police Force Xi'an 710086 China Network and Information Security Key Laboratory Electronics Department Engineering University of CAPF Xi'an 710086 China
File distributing and sharing is one of the most commonly used services in cloud computing and the requirement of data security grows with the cloud computing spreading. Attribute based encryption is one of the most a... 详细信息
来源: 评论
proceedings - 2013 5th International conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
Proceedings - 2013 5th International Conference on Intellige...
收藏 引用
2013 5th International conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
the proceedings contain 241 papers. the topics discussed include: a new adaptive filtering algorithm based on the current statistical model;a strategic decision framework for sustainability in supply;backstepping base...
来源: 评论
proceedings - 2013 5th International conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
Proceedings - 2013 5th International Conference on Intellige...
收藏 引用
2013 5th International conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
the proceedings contain 241 papers. the topics discussed include: a new adaptive filtering algorithm based on the current statistical model;a strategic decision framework for sustainability in supply;backstepping base...
来源: 评论