咨询与建议

限定检索结果

文献类型

  • 555 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 430 篇 工学
    • 418 篇 计算机科学与技术...
    • 139 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 13 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 552 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"
556 条 记 录,以下是491-500 订阅
排序:
Stalking Online: on User privacy in Social Networks  12
Stalking Online: on User Privacy in Social Networks
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Yang, Yuhao Lutes, Jonathan Li, Fengjun Luo, Bo Liu, Peng Department of Eecs The University of Kansas LawrenceKS United States College of Ist The Pennsylvania State University University ParkPA United States
With the extreme popularity of Web and online social networks, a large amount of personal information has been made available over the Internet. On the other hand, advances in information retrieval, data mining and kn... 详细信息
来源: 评论
Short paper: Location privacy: User behavior in the field
Short paper: Location privacy: User behavior in the field
收藏 引用
2nd acm Workshop on security and privacy in Smartphones and Mobile Devices, SPSM 2012
作者: Fisher, Drew Dorner, Leah Wagner, David Department of Electrical Engineering and Computer Science University of California Berkeley Berkeley CA 94720-1776 United States
Current smartphone platforms provide ways for users to control access to information about their location. For instance, on the iPhone, when an application requests access to location information, the operating system... 详细信息
来源: 评论
Cachet: A decentralized architecture for privacy preserving social networking with caching  12
Cachet: A decentralized architecture for privacy preserving ...
收藏 引用
8th acm International conference on Emerging Networking EXperiments and Technologies, CoNEXT 2012
作者: Nilizadeh, Shirin Jahid, Sonia Mittal, Prateek Borisov, Nikita Kapadia, Apu Indiana University Bloomington United States University of Illinois Urbana-Champaign United States University of California Berkeley United States
Online social networks (OSNs) such as Facebook and Google+ have transformed the way our society communicates. However, this success has come at the cost of user privacy;in today's OSNs, users are not in control of... 详细信息
来源: 评论
Understanding and improving app installation security mechanisms through empirical analysis of android
Understanding and improving app installation security mechan...
收藏 引用
2nd acm Workshop on security and privacy in Smartphones and Mobile Devices, SPSM 2012
作者: Barrera, David Clark, Jeremy McCarney, Daniel Van Oorschot, Paul C. School of Computer Science Carleton University Canada
We provide a detailed analysis of two largely unexplored aspects of the security decisions made by the Android op-erating system during the app installation process: update integrity and UID assignment. To inform our ... 详细信息
来源: 评论
Risk-based security decisions under uncertainty  12
Risk-based security decisions under uncertainty
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Molloy, Ian Dickens, Luke Morisset, Charles Cheng, Pau-Chen Lobo, Jorge Russo, Alessandra Ibm Research Tj Watson HawthorneNY United States Imperial College London United Kingdom Security Group IIT-CNR Pisa Italy
This paper addresses the making of security decisions, such as access-control decisions or spam filtering decisions, under uncertainty, when the benefit of doing so outweighs the need to absolutely guarantee these dec... 详细信息
来源: 评论
The challenge of data and application security and privacy (DASPY)
The challenge of data and application security and privacy (...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Sandhu, Ravi Institute for Cyber Security University of Texas San Antonio TX United States
This talk gives a personal perspective on the topic area of this new conference on data and application security and privacy, the difficult nature of the challenge we are confronting and possible research thrusts that... 详细信息
来源: 评论
"These Aren't the Droids You're Looking For": Retrofitting Android to Protect data from Imperious applications  11
"These Aren't the Droids You're Looking For": Retrofitting A...
收藏 引用
18th acm conference on Computer and Communications security (CCS)
作者: Hornyack, Peter Han, Seungyeop Jung, Jaeyeon Schechter, Stuart Wetherall, David Univ Washington Seattle WA 98195 USA Microsoft Res Redwood City CA USA
We examine two privacy controls for Android smartphones that empower users to run permission-hungry applications while protecting private data from being exfiltrated: (1) covertly substituting shadow data in place of ... 详细信息
来源: 评论
Research agenda for data and application security
Research agenda for data and application security
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Wang, X. Sean National Science Foundation University of Vermont Arlington VA United States
data and application security is traditionally viewed as a subfield of cybersecurity. The goal is still the same, namely to provide trustworthy computing infrastructure. However, in data and application security, we a... 详细信息
来源: 评论
Key dependent message security: Recent results and applications  11
Key dependent message security: Recent results and applicati...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Malkin, Tal Teranishi, Isamu Yung, Moti Columbia University New York NY United States NEC Corporation Columbia University United States Google Inc. Columbia University United States
An encryption scheme is Key Dependent Message (KDM) secure if it is secure even against an attacker who has access to encryptions of messages which depend on the secret key. Recent studies have revealed that this stro... 详细信息
来源: 评论
Distributed data usage control for web applications: A social network implementation  11
Distributed data usage control for web applications: A socia...
收藏 引用
1st acm conference on data and application security and privacy, CODASPY'11
作者: Kumari, Prachi Pretschner, Alexander Peschla, Jonas Kuhn, Jens-Michael Karlsruhe Institute of Technology 76131 Karlsruhe Germany TU Kaiserslautern 67653 Kaiserslautern Germany
Usage control is concerned with how data is used after access to it has been granted. Respective enforcement mechanisms need to be implemented at different layers of abstraction in order to monitor or control data at ... 详细信息
来源: 评论