咨询与建议

限定检索结果

文献类型

  • 558 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 433 篇 工学
    • 421 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 105 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 115 篇 理学
    • 106 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 60 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 554 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"
559 条 记 录,以下是501-510 订阅
排序:
Key dependent message security: Recent results and applications  11
Key dependent message security: Recent results and applicati...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Malkin, Tal Teranishi, Isamu Yung, Moti Columbia University New York NY United States NEC Corporation Columbia University United States Google Inc. Columbia University United States
An encryption scheme is Key Dependent Message (KDM) secure if it is secure even against an attacker who has access to encryptions of messages which depend on the secret key. Recent studies have revealed that this stro... 详细信息
来源: 评论
Distributed data usage control for web applications: A social network implementation  11
Distributed data usage control for web applications: A socia...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Kumari, Prachi Pretschner, Alexander Peschla, Jonas Kuhn, Jens-Michael Karlsruhe Institute of Technology 76131 Karlsruhe Germany TU Kaiserslautern 67653 Kaiserslautern Germany
Usage control is concerned with how data is used after access to it has been granted. Respective enforcement mechanisms need to be implemented at different layers of abstraction in order to monitor or control data at ... 详细信息
来源: 评论
privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions  11
Privacy-enhanced reputation-feedback methods to reduce feedb...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Goodrich, Michael T. Kerschbaum, Florian Dept. of Computer Science University of California Irvine CA 92697-3435 United States SAP Research Vincenz-Priessnitz-Str. 1 76131 Karlsruhe Germany
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedback extortion. The main idea behind our t... 详细信息
来源: 评论
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets  11
Implementation and performance evaluation of privacy-preserv...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Mayer, Daniel A. Teubert, Dominik Wetzel, Susanne Meyer, Ulrike Stevens Institute of Technology Castle Point on Hudson Hoboken NJ 07030 United States UMIC Research Center RWTH Aachen University Aachen Germany
Recently, new protocols were proposed which allow two parties to reconcile their ordered input sets in a fair and privacy-preserving manner. In this paper we present the design and implementation of these protocols on... 详细信息
来源: 评论
Enforcing physically restricted access control for remote data  11
Enforcing physically restricted access control for remote da...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Kirkpatrick, Michael S. Kerr, Sam Department of Computer Science Purdue University West Lafayette IN 47907 United States
In a distributed computing environment, remote devices must often be granted access to sensitive information. In such settings, it is desirable to restrict access only to known, trusted devices. While approaches based... 详细信息
来源: 评论
Towards defining semantic foundations for purpose-based privacy policies  11
Towards defining semantic foundations for purpose-based priv...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Jafari, Mohammad Fong, Philip W.L. Safavi-Naini, Reihaneh Barker, Ken Sheppard, Nicholas Paul Department of Computer Science University of Calgary 2500 University DR NW Calgary AB T2N-1N4 Canada Library eServices Queensland University of Technology GPO Box 2434 Brisbane QLD 4001 Australia
We define a semantic model for purpose, based on which purpose-based privacy policies can be meaningfully expressed and enforced in a business system. The model is based on the intuition that the purpose of an action ... 详细信息
来源: 评论
Mixture of Gaussian models and bayes error under differential privacy  11
Mixture of Gaussian models and bayes error under differentia...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Xi, Bowei Kantarcioǧlu, Murat Inan, Ali Department of Statistics Purdue University United States Dept. of Computer Science University of Texas Dallas United States Dept. of Computer Eng. Isik University Istanbul Turkey
Gaussian mixture models are an important tool in Bayesian decision theory. In this study, we focus on building such models over statistical database protected under differential privacy. Our approach involves querying... 详细信息
来源: 评论
Identifying a critical threat to privacy through automatic image classification  11
Identifying a critical threat to privacy through automatic i...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Lorenzi, David Vaidya, Jaideep Rutgers University 1 Washington Park Newark NJ 07102 United States
Image classification, in general, is considered a hard problem, though it is necessary for many useful applications such as automatic target recognition. Indeed, no general methods exist that can work in varying scena... 详细信息
来源: 评论
Old, new, borrowed, blue - A perspective on the evolution of mobile platform security architectures  11
Old, new, borrowed, blue - A perspective on the evolution of...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Kostiainen, Kari Reshetova, Elena Ekberg, Jan-Erik Asokan, N. Nokia Research Center Finland
The recent dramatic increase in the popularity of "smartphones" has led to increased interest in smartphone security research. From the perspective of a security researcher the noteworthy attributes of a mod... 详细信息
来源: 评论
privacy-preserving activity scheduling on mobile devices  11
Privacy-preserving activity scheduling on mobile devices
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Bilogrevic, Igor Jadliwala, Murtuza Hubaux, Jean-Pierre Aad, Imad Niemi, Valtteri EPFL CH-1015 Lausanne Switzerland Nokia Research Center CH-1015 Lausanne Switzerland
Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users' personal schedules. Users also access popular context-based services, typically provided by thi... 详细信息
来源: 评论