咨询与建议

限定检索结果

文献类型

  • 1,490 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,522 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 25 篇 data security
  • 24 篇 sensitive data
  • 23 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 the first resear...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,386 篇 英文
  • 134 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1522 条 记 录,以下是1371-1380 订阅
排序:
Let Only the Right One IN: privacy Management Scheme for Social Network
Let Only the Right One IN: Privacy Management Scheme for Soc...
收藏 引用
5th International conference on Information Systems security
作者: Gampa, Nagaraja Kaushik Khot, Rohit Ashok Srinathan, Kannan Int Inst Informat Technol CSTAR Hyderabad Andhra Pradesh India
Current social networking sites protect user data by making it available only to a restricted set of people, often friends. However, the concept of 'friend' is illusory in social networks. Adding a person to t... 详细信息
来源: 评论
security models for contextual based global processing an architecture and overview  09
Security models for contextual based global processing an ar...
收藏 引用
CSIIRW 2009: 5th Annual Cyber security and Information Intelligence Research Workshop: Cyber security and Information Intelligence Challenges and Strategies
作者: Vert, Gregory Iyengar, S.S. Phoha, Vir Center for Secure Cyberspace Computer Science Louisiana State University United States
In this paper, we introduce a new paradigm for global computation, one in which the context of collected information drives the type of processing and dissemination the information receives as it is dispersed around t... 详细信息
来源: 评论
security and seamless mobility based architecture for hybrid network of enterprise
Security and seamless mobility based architecture for hybrid...
收藏 引用
5th International conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009
作者: Jingling, Zhao Jinjun, Pan Liming, Hou School of Computer Beijing University of Posts and Telecommunications Beijing China Department of Electronic and Engineering Tsinghua University Beijing China
Nowadays, cause of the high data rate access capability, Wi-Fi and WiMAX technology are becoming today's key technology in wireless access field, and the seamless integration between them received extensive attent... 详细信息
来源: 评论
security for a Smarter Planet
Security for a Smarter Planet
收藏 引用
5th International conference on Information Systems security
作者: Nagaratnam, Nataraj IBM India Software Lab New Delhi India
Bit by bit, our planet is getting smarter. By this, we mean the systems that run, the way we live and work as a society. three things have brought this about - the world is becoming instrumented, interconnected and in... 详细信息
来源: 评论
A security architecture to protect against the insider threat from damage, fraud and theft  09
A security architecture to protect against the insider threa...
收藏 引用
CSIIRW 2009: 5th Annual Cyber security and Information Intelligence Research Workshop: Cyber security and Information Intelligence Challenges and Strategies
作者: Blackwell, Clive Information Security Group Royal Holloway University of London Egham Surrey. TW20 0EX United Kingdom
the insider threat poses a significant and increasing problem for organizations. this is shown by the regular stories of fraud and data loss reported daily in the media in the US and elsewhere. there is a need to prov... 详细信息
来源: 评论
Injecting purpose and trust into data anonymisation
Injecting purpose and trust into data anonymisation
收藏 引用
acm 18th International conference on Information and Knowledge Management, CIKM 2009
作者: Sun, Xiaoxun Wang, Hua Li, Jiuyong Department of Mathematics and Computing University of Southern Queensland Australia School of Computer and Information Science University of South Australia Australia
Most existing works of data anonymisation target at the optimization of the anonymisation metrics to balance the data utility and privacy, whereas they ignore the effects of a requester's trust level and applicati... 详细信息
来源: 评论
the multi-tenant data architecture design for the collaboration service system of textile & apparel supply chain
The multi-tenant data architecture design for the collaborat...
收藏 引用
5th International conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009
作者: Xiao, Feng Wang Ping, Jun Dong School of Business and Management Donghua University Shanghai 200051 China
Multi-tenant technology is one of key competencies for Software as a Service (SaaS) to achieve higher profit margin by leveraging the economic scale. In China, there are a number of textile & apparel OEM enterpris... 详细信息
来源: 评论
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
Defending against Key Abuse Attacks in KP-ABE Enabled Broadc...
收藏 引用
5th International ICST conference on security and privacy in Communication Networks
作者: Yu, Shucheng Ren, Kui Lou, Wenjing Li, Jin Worcester Polytech Inst Dept ECE Worcester MA 01609 USA IIT Dept ECE Chicago IL 60616 USA
Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application... 详细信息
来源: 评论
Introduction of first passage time (FPT) analysis for software reliability and network security  09
Introduction of first passage time (FPT) analysis for softwa...
收藏 引用
CSIIRW 2009: 5th Annual Cyber security and Information Intelligence Research Workshop: Cyber security and Information Intelligence Challenges and Strategies
作者: Ma, Zhanshan Krings, Axel W. Millar, Richard C. Computer Science Department University of Idaho Moscow ID 83844 United States Department of Systems Engineering Naval Postgraduate School United States
the study of the First Passage Time (FPT) problem (also known as first passage problem, FPP) started more than a century ago, but its diverse applications in science and engineering mostly emerged in the last two to t... 详细信息
来源: 评论
security in e-Science
Security in e-Science
收藏 引用
IEEE International conference on E-Science Workshops
作者: Richard Sinnott University of Glasgow UK
In recent years, e-Science and e-Research more generally, has grown considerably and the scope of application now covers research domains from science and engineering through to the arts and humanities and the social ... 详细信息
来源: 评论