咨询与建议

限定检索结果

文献类型

  • 556 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 557 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 431 篇 工学
    • 419 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 552 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"
557 条 记 录,以下是211-220 订阅
排序:
Far Cry: Will CDNs Hear NDN's Call?  7
Far Cry: Will CDNs Hear NDN's Call?
收藏 引用
7th acm Annual conference on Information-Centric Networking (ICN)
作者: Ghasemi, Chavoosh Yousefi, Hamed Zhang, Beichuan Univ Arizona Tucson AZ 85721 USA Aryaka Networks San Mateo CA USA
Content Delivery Networks (CDNs) have become indispensable to Internet content distribution. As they evolve to meet the ever-increasing demands, they are also facing challenges such as system complexity, resource foot... 详细信息
来源: 评论
Designing a serious game: teaching developers to embed privacy into software systems  20
Designing a serious game: teaching developers to embed priva...
收藏 引用
proceedings of the 35th IEEE/acm International conference on Automated Software Engineering
作者: Nalin Asanka Gamagedara Arachchilage Mumtaz Abdul Hameed La Trobe University Australia Technovation Consulting & Training PVT
Software applications continue to challenge user privacy when users interact with them. privacy practices (e.g. data Minimisation (DM), privacy by Design (PbD) or General data Protection Regulation (GDPR)) and related... 详细信息
来源: 评论
An urban sensing architecture as essential infrastructure for future cities  21
An urban sensing architecture as essential infrastructure fo...
收藏 引用
proceedings of the 14th IEEE/acm International conference on Utility and Cloud Computing Companion
作者: Vijay Kumar George Oikonomou Theo Tryfonas University of Bristol
Climate change and migration have become one of the most challenging problems for our civilization. In this context, city councils work hard to manage essential services for citizens such as waste collection, street l... 详细信息
来源: 评论
Custom-made Anonymization by data Analysis Program Provided by Recipient  19
Custom-made Anonymization by Data Analysis Program Provided ...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Maeda, Wakana Yamaoka, Yuji Fujitsu Labs Ltd Kawasaki Kanagawa Japan
Anonymization is a method used in privacy-preserving data publishing. Previous studies show that anonymization based on the request of a data recipient, the priority of attributes, helps to maintain data utility. Howe... 详细信息
来源: 评论
Preserving privacy of data with Efficient Attribute-based Encryption Schemes  21
Preserving Privacy of Data with Efficient Attribute-based En...
收藏 引用
Adjunct proceedings of the 29th acm conference on User Modeling, Adaptation and Personalization
作者: Nikos Komninos City University of London United Kingdom
Attribute-based encryption (ABE) schemes and their variations are often applied to preserve the privacy of data. In particular, ABE schemes proposals are resilient to multiple attacks, including attacks in interceptio... 详细信息
来源: 评论
PrivStream: Differentially Private Event Detection on data Streams  19
PrivStream: Differentially Private Event Detection on Data S...
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Fanaeepour, Maryam Machanavajjhala, Ashwin Duke Univ Dept Comp Sci Durham NC 27706 USA
Event monitoring and detection in real-time systems is crucial. Protecting users' data while reporting an event in almost real-time will increase the level of this challenge. In this work, we adopt the strong noti... 详细信息
来源: 评论
CODASPY 2016 - proceedings of the 6th acm conference on data and application security and privacy
CODASPY 2016 - Proceedings of the 6th ACM Conference on Data...
收藏 引用
6th acm conference on data and application security and privacy, CODASPY 2016
The proceedings contain 38 papers. The topics discussed include: building privacy-preserving cryptographic credentials from federated online identities;Neuralyzer: flexible expiration times for the revocation of onlin...
来源: 评论
CURIE: Policy-based Secure data Exchange  19
CURIE: Policy-based Secure Data Exchange
收藏 引用
9th acm conference on data and application security and privacy (CODASPY)
作者: Celik, Z. Berkay Acar, Abbas Aksu, Hidayet Atsley, Ryan She McDaniel, Patrick Uluagac, A. Selcuk Penn State Univ Dept CSE SIIS Lab University Pk PA 16802 USA Florida Int Univ Dept ECE CPS Secur Lab Miami FL 33199 USA
data sharing among partners-users, companies, organizations-is crucial for the advancement of collaborative machine learning in many domains such as healthcare, finance, and security. Sharing through secure computatio... 详细信息
来源: 评论
Session details: Session 8: privacy II  20
Session details: Session 8: Privacy II
收藏 引用
proceedings of the Tenth acm conference on data and application security and privacy
作者: Sudip Mittal University of North Carolina Wilmington
No abstract available.
来源: 评论
Session details: Session 4: privacy I  20
Session details: Session 4: Privacy I
收藏 引用
proceedings of the Tenth acm conference on data and application security and privacy
作者: Maribel Fernandez King's College London
No abstract available.
来源: 评论