咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是1361-1370 订阅
排序:
Secure access control scheme of RFID system application
Secure access control scheme of RFID system application
收藏 引用
5th International conference on Information Assurance and security, IAS 2009
作者: Huang, Yu-Chih Department of Information Management Tainan University of Technology Tainan Taiwan
Radio Frequency Identification (RFID) is a contactless technology, it considered the way to replace the barcode, since the barcode is data read with line of sight and limits the utility for item-level of logistic and ... 详细信息
来源: 评论
A more well-founded security proof of the privacy-preserving distributed mining of association rules protocols
A more well-founded security proof of the privacy-preserving...
收藏 引用
1st International Workshop on Model Driven Service Engineering and data Quality and security, MoSE+DQS 2009, Co-located with the 18th acm International conference on Information and Knowledge Management, CIKM 2009
作者: Zhang, Feng Zhao, Gansen School of Software Sun Yat-sen University Guangzhou 510275 China
privacy-preserving data mining aims at discovering beneficial information from a large amount of data without violating the privacy policy. privacy-preserving association rules mining research has already generated ma... 详细信息
来源: 评论
Trusted privacy Domains - Challenges for Trusted Computing in privacy-Protecting Information Sharing
收藏 引用
5th International conference on Information security Practice and Experience
作者: Loehr, Hans Sadeghi, Ahmad-Reza Vishik, Claire Winandy, Marcel Ruhr Univ Bochum Horst Gortz Inst IT Secur Bochum Germany Intel Corp Santa Clara CA 95051 USA
With the growing use of the Internet, users need to reveal an increasing amount of private information when accessing online services, and, with growing integration, this information is shared among services. Although... 详细信息
来源: 评论
An XacmL-based privacy-centered access control system
An XACML-based privacy-centered access control system
收藏 引用
1st acm Workshop on Information security Governance, WISG '09, Co-located with the 16th acm Computer and Communications security conference, CCS'09
作者: Ardagna, Claudio Agostino De Capitani Di Vimercati, Sabrina Paraboschi, Stefano Pedrini, Eros Samarati, Pierangela Università degli Studi di Milano 26013 Crema Italy Università di Bergamo 24044 Dalmine Italy
the widespread diffusion of the Internet as the platform for accessing distributed services makes available a huge amount of personal data, and a corresponding concern and demand from users, as well as legislation, fo... 详细信息
来源: 评论
A generic framework for a dynamic identity management and discovery system
A generic framework for a dynamic identity management and di...
收藏 引用
5th International conference on Testbeds and Research Infrastructures for the Development of Networks and Communities
作者: Lampropoulos, Konstantinos Denazis, Spyros Univ Patras Patras Greece
Moving towards network convergence, a highly complex identity environment is emerging due to the heterogeneity of protocols, networks and devices as well as user requirements. the diversity of names and identities oft... 详细信息
来源: 评论
CSIIRW09: Fifth Annual Cyber security and Information Intelligence Research Workshop: Cyber security and Information Intelligence Challenges and Strategies
CSIIRW09: Fifth Annual Cyber Security and Information Intell...
收藏 引用
CSIIRW 2009: 5th Annual Cyber security and Information Intelligence Research Workshop: Cyber security and Information Intelligence Challenges and Strategies
the proceedings contain 58 papers. the topics discussed include: security-oriented program transformations;security policy testing via automated program code generation;long term data storage issues for situational aw...
来源: 评论
A tree-based approach to preserve the privacy of software engineering data and predictive models  09
A tree-based approach to preserve the privacy of software en...
收藏 引用
5th International conference on Predictor Models in Software Engineering, PROMISE '09
作者: Fu, Yu Koru, A. Güneş Chen, Zhiyuan El Emam, Khaled Department of Information Systems UMBC Baltimore MD 21250 United States University of Ottawa Faculty of Medicine School of Information Technology and Engineering Ottawa CA Canada
In empirical disciplines, data sharing leads to verifiable research and facilitates future research studies. Recent efforts of the PROMISE community contributed to data sharing and reproducible research in software en... 详细信息
来源: 评论
A Secure Protocol to Maintain data privacy in data Mining
A Secure Protocol to Maintain Data Privacy in Data Mining
收藏 引用
5th International conference on Advanced data Mining and applications
作者: Camara, Fode Ndiaye, Samba Slimani, Yahya Cheikh Anta Diop Univ Dept Math & Comp Sci Dakar Senegal Fac Sci Tunis Dept Comp Sci Tunis 1060 Tunisia
Recently, privacy issues have becomes important in data mining, especially when data is horizontally or vertically partitioned. For the vertically partitioned case, many data mining problems call be reduced to securel... 详细信息
来源: 评论
proceedings - 5th International conference on Signal-Image Technology and Internet-Based Systems, SITIS 2009
Proceedings - 5th International Conference on Signal-Image T...
收藏 引用
5th International conference on Signal-Image Technology and Internet-Based Systems, SITIS 2009
the proceedings contain 69 papers. the topics discussed include: an extensible XacmL authorization web service: application to dynamic web sites access control;indexing skills developed by learning objects based on th...
来源: 评论
privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party data
Privacy-Preserving Distributed <i>k</i>-Nearest Neighbor Min...
收藏 引用
5th International conference on Advanced data Mining and applications
作者: Zhang, Feng Zhao, Gansen Xing, Tingyan Sun Yat Sen Univ Sch Software Guangzhou 510275 Guangdong Peoples R China Sun Yat Sen Univ Guangdong Key Lab Informat Secur Technol Guangzhou 510275 Guangdong Peoples R China China Univ Geosci Sch Informat Engn Beijing 100083 Peoples R China
k-Nearest Neighbor (k-NN) mining aims to retrieve the k most similar objects to the query objects. It can be incorporated into many data mining algorithms, Such as outlier detection, clustering, and k-NN classificatio... 详细信息
来源: 评论