咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1351-1360 订阅
排序:
Enforcing end-to-end application security in the cloud (big ideas paper)  10
Enforcing end-to-end application security in the cloud (big ...
收藏 引用
proceedings of the acm/IFIP/USENIX 11th International conference on Middleware
作者: Jean Bacon David Evans David M. Eyers Matteo Migliavacca Peter Pietzuch Brian Shand University of Cambridge Imperial College London CBCU/ECRIC National Health Serivice
security engineering must be integrated with all stages of application specification and development to be effective. Doing this properly is increasingly critical as organisations rush to offload their software servic... 详细信息
来源: 评论
A new node contribution factors for the low frequency oscillations of power system based on the PMU's data and HHT
A new node contribution factors for the low frequency oscill...
收藏 引用
International conference on Critical Infrastructure
作者: Li, Jin Xue, Ancheng Wang, Jinping Ding, Lan Wang, Maohai Bi, Tianshu Han, Fukun Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control School of Electrical and Electronic Engineering North China Electric Power University Beijing 102206 China North China Power Dispatching Center Beijing 100053 China North China Electric Power Research Institute Co.Ltd Beijing 100045 China
With the rapid development and interconnection of power systems, the low frequency oscillations(LFO) has become one of the serious factors threatening the power system stability. thus, how to quickly locate the source... 详细信息
来源: 评论
proceedings of the 8th acm Workshop on privacy in the Electronic Society, WPES '09, Co-located with the 16th acm Computer and Communications security conference, CCS'09
Proceedings of the 8th ACM Workshop on Privacy in the Electr...
收藏 引用
8th acm Workshop on privacy in the Electronic Society, WPES '09, Co-located with the 16th acm Computer and Communications security conference, CCS'09
the proceedings contain 15 papers. the topics discussed include: the effects of introspection on creating privacy policy;key allocation schemes for private social networks;a distortion-based metric for location privac...
来源: 评论
User-centric identity governance across domain boundaries
User-centric identity governance across domain boundaries
收藏 引用
5th acm Workshop on Digital Identity Management, DIM '09, Co-located with the 16th acm Computer and Communications security conference, CCS'09
作者: Gomi, Hidehito Yahoo Japan Research 9-7-1 Akasaka Minato-ku Tokyo 107-6211 Japan
Identity management is a set of viable technologies for supporting electronic interactions requiring identity information in the digital world. Although numerous elemental technologies have been developed in support o... 详细信息
来源: 评论
privacy-aware security applications using RFID technology  09
Privacy-aware security applications using RFID technology
收藏 引用
CSIIRW 2009: 5th Annual Cyber security and Information Intelligence Research Workshop: Cyber security and Information Intelligence Challenges and Strategies
作者: Srinivasan, S. Department of Computer Information Systems University of Louisville Louisville KY 40292 United States
Radio Frequency IDentification (RFID) technology based applications are gaining widespread acceptance. Much of the RFID use at this time is in tracking objects. this type of application takes a variety of forms. Our g... 详细信息
来源: 评论
application containers without virtual machines
Application containers without virtual machines
收藏 引用
1st acm Workshop on Virtual Machine security, VMSec '09, Co-located with the 16th acm Computer and Communications security conference, CCS'09
作者: Sherr, Micah Blaze, Matt Dept. of Computer and Information Science University of Pennsylvania Philadelphia PA United States
this position paper introduces lightweight cryptographic jails (CryptoJails) that protect the privacy of application data by intercepting write accesses and redirecting them to encrypted application containers. Crypto... 详细信息
来源: 评论
Redactable signatures on data with dependencies and their application to personal health records
Redactable signatures on data with dependencies and their ap...
收藏 引用
8th acm Workshop on privacy in the Electronic Society, WPES '09, Co-located with the 16th acm Computer and Communications security conference, CCS'09
作者: Bauer, David Blough, Douglas M. Mohan, Apurva Georgia Institute of Technology School of ECE Atlanta GA United States
Storage of personal information by service providers risks privacy loss from data breaches. Our prior work on minimal disclosure credentials presented a mechanism to control the dissemination of personal information. ... 详细信息
来源: 评论
Secure access control scheme of RFID system application
Secure access control scheme of RFID system application
收藏 引用
5th International conference on Information Assurance and security, IAS 2009
作者: Huang, Yu-Chih Department of Information Management Tainan University of Technology Tainan Taiwan
Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and ... 详细信息
来源: 评论
A more well-founded security proof of the privacy-preserving distributed mining of association rules protocols
A more well-founded security proof of the privacy-preserving...
收藏 引用
1st International Workshop on Model Driven Service Engineering and data Quality and security, MoSE+DQS 2009, Co-located with the 18th acm International conference on Information and Knowledge Management, CIKM 2009
作者: Zhang, Feng Zhao, Gansen School of Software Sun Yat-sen University Guangzhou 510275 China
privacy-preserving data mining aims at discovering beneficial information from a large amount of data without violating the privacy policy. privacy-preserving association rules mining research has already generated ma... 详细信息
来源: 评论
Trusted privacy Domains - Challenges for Trusted Computing in privacy-Protecting Information Sharing
收藏 引用
5th International conference on Information security Practice and Experience
作者: Loehr, Hans Sadeghi, Ahmad-Reza Vishik, Claire Winandy, Marcel Ruhr Univ Bochum Horst Gortz Inst IT Secur Bochum Germany Intel Corp Santa Clara CA 95051 USA
With the growing use of the Internet, users need to reveal an increasing amount of private information when accessing online services, and, with growing integration, this information is shared among services. Although... 详细信息
来源: 评论