咨询与建议

限定检索结果

文献类型

  • 1,487 篇 会议
  • 26 册 图书
  • 6 篇 期刊文献

馆藏范围

  • 1,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 1,073 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 311 篇 信息与通信工程
    • 139 篇 电气工程
    • 118 篇 控制科学与工程
    • 66 篇 安全科学与工程
    • 44 篇 电子科学与技术(可...
    • 44 篇 网络空间安全
    • 41 篇 动力工程及工程热...
    • 38 篇 生物医学工程(可授...
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 建筑学
    • 28 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 20 篇 环境科学与工程(可...
  • 237 篇 理学
    • 168 篇 数学
    • 42 篇 生物学
    • 28 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
  • 219 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 74 篇 法学
    • 44 篇 社会学
    • 31 篇 法学
  • 62 篇 医学
    • 50 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 2 篇 文学

主题

  • 147 篇 privacy
  • 109 篇 security
  • 75 篇 data privacy
  • 68 篇 blockchain
  • 46 篇 internet of thin...
  • 38 篇 differential pri...
  • 38 篇 machine learning
  • 36 篇 network security
  • 36 篇 cryptography
  • 33 篇 cloud computing
  • 32 篇 authentication
  • 29 篇 access control
  • 27 篇 big data
  • 24 篇 sensitive data
  • 23 篇 data security
  • 22 篇 deep learning
  • 22 篇 data mining
  • 22 篇 federated learni...
  • 21 篇 artificial intel...
  • 19 篇 iot

机构

  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 5 篇 carnegie mellon ...
  • 5 篇 school of cyber ...
  • 4 篇 nanjing audit un...
  • 4 篇 stevens inst tec...
  • 4 篇 univ michigan an...
  • 4 篇 fraunhofer aisec...
  • 4 篇 univ texas dalla...
  • 4 篇 institute of inf...
  • 4 篇 chinese acad sci...
  • 3 篇 singapore inst t...
  • 3 篇 chinese acad sci...
  • 3 篇 university of mi...
  • 3 篇 umass boston bos...
  • 3 篇 east china norma...
  • 3 篇 beijing univ pos...
  • 3 篇 university of el...
  • 3 篇 carnegie mellon ...
  • 3 篇 tech univ dresde...

作者

  • 9 篇 bertino elisa
  • 6 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 sandhu ravi
  • 5 篇 meyer ulrike
  • 5 篇 kantarcioglu mur...
  • 4 篇 conti mauro
  • 4 篇 felber pascal
  • 4 篇 mehrotra sharad
  • 4 篇 li lei
  • 3 篇 gupta maanak
  • 3 篇 jianying zhou
  • 3 篇 zhang lei
  • 3 篇 lee adam j.
  • 3 篇 li jin
  • 3 篇 balachandran viv...
  • 3 篇 patwa farhan
  • 3 篇 xiong gang
  • 3 篇 saxena nitesh
  • 3 篇 sallam asmaa

语言

  • 1,390 篇 英文
  • 127 篇 其他
  • 7 篇 中文
检索条件"任意字段=Proceedings of the 5th ACM Conference on Data and Application Security and Privacy"
1519 条 记 录,以下是1481-1490 订阅
排序:
Condition-driven integration of security services - Keynote lecture  6th
收藏 引用
6th Australasian conference on Information security and privacy
作者: Neumann, C Univ So Calif Inst Sci Informat Los Angeles CA 90089 USA
Deploying security services is hard. security services are more readily integrated when they can be added at a single point in a network or at a single layer in the protocol stack. Most of today’s widely deployed sec... 详细信息
来源: 评论
Towards a new authorisation paradigm for extranets  5th
收藏 引用
5th Australasian conference on Information security and privacy, ACISP 2000
作者: Au, Richard Looi, Mark Ashley, Paul Information Security Research Centre School of Data Communications Queensland University of Technology GPO Box 2434 BrisbaneQLD4001 Australia Tivoli Security Business Unit 9020 Capital of Texas Highway Building 1 Suite 270 AustinTX78759 United States
the development of extranets is transforming enterprise networking. Rather than using proprietary networks to exchange private information, organisations can now set up corporate extranets to exchange data and share a... 详细信息
来源: 评论
Chinese Wall security model and conflict analysis
Chinese Wall security model and conflict analysis
收藏 引用
IEEE Annual International Computer Software and applications conference (COMPSAC)
作者: Tsau Young Lin Department of Mathematics and Computer Science San Jose State University Foundation San Jose CA USA Berkeley Initiative in Soft Computing University of California Berkeley CA USA
D.D.C. Brewer and M.J. Nash (IEEE Symposium on security and privacy, pp. 206-14, 1988) introduced Chinese Wall security policy models for commercial security. these were later updated by T.Y. Lin (Proc. 5th Aerospace ... 详细信息
来源: 评论
Distributed objects and software application wrappers: A vehicle for software re-engineering
Distributed objects and software application wrappers: A veh...
收藏 引用
5th Working conference on Reverse Engineering (WCRE 98)
作者: Kontogiannis, K Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada
来源: 评论
5th European Symposium on Research in Computer security, ESORICS 1998
5th European Symposium on Research in Computer Security, ESO...
收藏 引用
5th European Symposium on Research in Computer security, ESORICS 1998
the proceedings contain 24 papers. the special focus in this conference is on Research in Computer security. the topics include: Fixed vs. variable-length patterns for detecting suspicious process behavior;a tool for ...
来源: 评论
Implementation of RSA cryptoprocessor based on Montgomery algorithm
Implementation of RSA cryptoprocessor based on Montgomery al...
收藏 引用
International conference on Solid-State and Integrated Circuit Technology
作者: Deng Yuliang Mao Zhigang Ye Yizheng Wang Tao Harbin Institute of Technology China
the RSA algorithm is a major method in implementing a public key cryptosystem. On the basis that the Montgomery algorithm can modular-multiply in a fast way, this paper presents a hardware implementation of a 1024-bit... 详细信息
来源: 评论
privacy-enhanced desktop meeting system
Privacy-enhanced desktop meeting system
收藏 引用
IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE)
作者: V. Hassler N. Lutz R. Posch Information Systems Institute Distributed Systems Department University of Technology Vienna Vienna Austria Institute for Applied Information Processing and Communications Graz University of Technology Graz Austria
the paper presents a model of a secure collaborative application for conducting real-time electronic meetings from remote locations. the application consists of a set of tools, enabling common meeting tasks to be acco... 详细信息
来源: 评论
File-based network collaboration system  5
File-based network collaboration system
收藏 引用
5th USENIX UNIX security Symposium
作者: TAKAHASHI, T SHIMBO, A MUROTA, M TOSHIBA RES & DEV CTR COMMUN & INFORMAT SYST RES LABSSAIWAI KUKAWASAKIKANAGAWA 210JAPAN
Computer-Supported Cooperative Work (CSCW) requires coordinated access to shared information over computer networks;such networks have tended to use wires, but wireless networks are now becoming common. there are a la... 详细信息
来源: 评论
security requirements for cooperative work: a model and its system implications  6
Security requirements for cooperative work: a model and its ...
收藏 引用
proceedings of the 6th workshop on acm SIGOPS European workshop: Matching operating systems to application needs
作者: George Coulouris Jean Dollimore University of London London
applications involving cooperation between several users are often expressed in terms of operations on shared objects. the challenge is to provide adequate access to shared objects for cooperating principals while mai...
来源: 评论
An approach to data security in today's networked environment  5
An approach to data security in today's networked environmen...
收藏 引用
5th Annual IEEE International ASIC conference and Exhibit, ASIC 1992
作者: Slusarczyuk, R.V. Dirct. of New Business Planning VLSI Technology Inc. 8375 South River Parkway TempeAZ85284 United States
A data encryption processor and its responsiveness to the growing needs of the marketplace are described. Information integrity and data security are growing concerns in every environment. the VM007 supports these nee... 详细信息
来源: 评论