咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,523 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 110 篇 security
  • 76 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,307 篇 英文
  • 214 篇 其他
  • 9 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1523 条 记 录,以下是1271-1280 订阅
排序:
security challenges in Next generation HBB TV
Security challenges in Next generation HBB TV
收藏 引用
5th Joint IFIP Wireless and Mobile Networking conference (WMNC)
作者: Podhradsky, Pavol Londak, Juraj Labaj, Ondrej Matejka, Juraj Fac Elect Engn & Informat Technol STU Bratislava 81219 Slovakia
this paper dealt with several security aspects in multimedia systems. the possible threads of various attacks are summarized and described. the methods focused on the intrusion detection and protection, the tools that... 详细信息
来源: 评论
Technical enforcement of European privacy legislation: An access control approach
Technical enforcement of European privacy legislation: An ac...
收藏 引用
2012 5th International conference on New Technologies, Mobility and security, NTMS 2012
作者: Bekara, Kheira Laurent, Maryline Nguyen, than Ha Institut Telecom Telecom SudParis CNRS Samovar UMR 5157 9 rue Charles Fourier 91011 Evry France
Until today, the protection of personal data is mainly left to the legislation by means of guidelines. this paper aims to increase the perceived control by users over their data by helping the user's agent to chec... 详细信息
来源: 评论
Efficient data Tagging for Managing privacy in the Internet of things
Efficient Data Tagging for Managing Privacy in the Internet ...
收藏 引用
IEEE/acm International conference on Green Computing and Communications (GreenCom) / IEEE International conference on Internet of things (ithings) / 5th IEEE International conference on Cyber, Physical and Social Computing (CPSCom)
作者: Evans, David Eyers, David M. Univ Derby Sch Comp & Math Derby DE22 1GB England Univ Otago Dept Comp Sci Dunedin New Zealand
the Internet of things creates an environment where software systems are influenced and controlled by phenomena in the physical world. the goal is invisible and natural interactions with technology. However, if such s... 详细信息
来源: 评论
CloudProtect: Managing data privacy in cloud applications
CloudProtect: Managing data privacy in cloud applications
收藏 引用
2012 IEEE 5th International conference on Cloud Computing, CLOUD 2012
作者: Diallo, Mamadou H. Hore, Bijit Chang, Ee-Chien Mehrotra, Sharad Venkatasubramanian, Nalini Donald Bren School of Information and Computer Sciences University of California Irvine CA United States School of Computing National University of Singapore Singapore
this paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the va... 详细信息
来源: 评论
Improving trust and privacy models in social networks
Improving trust and privacy models in social networks
收藏 引用
2012 5th International conference on New Technologies, Mobility and security, NTMS 2012
作者: Jabeur, Nafaâ Zeadally, Sherali Maydebura, Sergey Computer Science Department Dhofar University Po. Box 2509 Salalah 211 Oman Department of Computer Science and Information Technology University of District of Columbia United States
the disclosure and misuse of personal information are two major problems of social networking sites. To address these problems, several models focusing on trust or privacy have been proposed. We propose a privacy mode... 详细信息
来源: 评论
Towards a policy enforcement infrastructure for distributed usage control  12
Towards a policy enforcement infrastructure for distributed ...
收藏 引用
17th acm Symposium on Access Control Models and Technologies, SacmAT'12
作者: Kelbert, Florian Pretschner, Alexander Karlsruhe Institute of Technology Am Fasanengarten 5 Karlsruhe Germany
Distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an applica... 详细信息
来源: 评论
In-vivo NFC: Remote monitoring of implanted medical devices with improved privacy  12
In-vivo NFC: Remote monitoring of implanted medical devices ...
收藏 引用
10th acm conference on Embedded Networked Sensor Systems, SenSys 2012
作者: Kim, Byungjo Yu, Jiung Kim, Hyogon Korea University Korea Republic of
Near field communication (NFC) technology can be a desirable technology for implantable medical devices (IMDs) owing to its communication range short enough for privacy and long enough for most IMD insertion locations... 详细信息
来源: 评论
privacy aware elearning environments based on hippocratic database principles  12
Privacy aware elearning environments based on hippocratic da...
收藏 引用
5th Balkan conference in Informatics, BCI 2012
作者: Azemović, Jasmin Faculty of Information Technologies Maršala Tita b.b University Džemal Bijedić Mostar Bosnia and Herzegovina
Ensuring privacy in modern information systems is of primary importance for the users of these environments. Use and trust of users certainly depends on the degree of privacy. Solution for the above mentioned problems... 详细信息
来源: 评论
Cachet: A decentralized architecture for privacy preserving social networking with caching  12
Cachet: A decentralized architecture for privacy preserving ...
收藏 引用
8th acm International conference on Emerging Networking EXperiments and Technologies, CoNEXT 2012
作者: Nilizadeh, Shirin Jahid, Sonia Mittal, Prateek Borisov, Nikita Kapadia, Apu Indiana University Bloomington United States University of Illinois Urbana-Champaign United States University of California Berkeley United States
Online social networks (OSNs) such as Facebook and Google+ have transformed the way our society communicates. However, this success has come at the cost of user privacy;in today's OSNs, users are not in control of... 详细信息
来源: 评论
proceedings of the International Workshop on Multi-Device App Middleware 2012, Multi-Device 2012 - Co-located with acm/IFIP/USENIX 13th International conference on Middleware
Proceedings of the International Workshop on Multi-Device Ap...
收藏 引用
International Workshop on Multi-Device App Middleware 2012, Multi-Device 2012 - Co-located with acm/IFIP/USENIX 13th International conference on Middleware
the proceedings contain 5 papers. the topics discussed include: towards a personalized and distributed in-car infotainment experience using the open and web-based webinos middleware;efficient data sharing for multi-de...
来源: 评论