咨询与建议

限定检索结果

文献类型

  • 559 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 422 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 107 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 117 篇 理学
    • 108 篇 数学
    • 10 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 34 篇 管理学
    • 22 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 21 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 555 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"
560 条 记 录,以下是481-490 订阅
排序:
Short paper: Enhancing mobile application permissions with runtime feedback and constraints
Short paper: Enhancing mobile application permissions with r...
收藏 引用
2nd acm Workshop on security and privacy in Smartphones and Mobile Devices, SPSM 2012
作者: Jung, Jaeyeon Han, Seungyeop Wetherall, David Microsoft Research One Microsoft Way Redmond WA United States University of Washington Allen Center Box 352350 Seattle WA United States
We report on a field study that uses a combination of OS measurements and qualitative interviews to highlight gaps between user expectations with respect to privacy and the result of using the existing permissions arc... 详细信息
来源: 评论
privacy Streamliner: A Two-Stage Approach to Improving Algorithm Efficiency  12
Privacy Streamliner: A Two-Stage Approach to Improving Algor...
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Liu, Wen Ming Wang, Lingyu Concordia Institute for Information Systems Engineering Concordia University MontrealQCH3G 1M8 Canada
In releasing data with sensitive information, a data owner usually has seemingly conflicting goals, including privacy preservation, utility optimization, and algorithm efficiency. In this paper, we observe that a high... 详细信息
来源: 评论
Comparison-based encryption for fine-grained access control in clouds  12
Comparison-based encryption for fine-grained access control ...
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Zhu, Yan Hu, Hongxin Ahn, Gail-Joon Yu, Mengyang Zhao, Hongjia Institute of Computer Science and Technology Peking University Beijing 100871 China Beijing Key Laboratory of Internet Security Technology Peking University Beijing 100871 China Arizona State University Tempe AZ 85281 United States
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regulating data access in clouds. In this ... 详细信息
来源: 评论
Measuring vote privacy, revisited  12
Measuring vote privacy, revisited
收藏 引用
2012 acm conference on Computer and Communications security, CCS 2012
作者: Bernhard, David Cortier, Véronique Pereira, Olivier Warinschi, Bogdan University of Bristol Bristol United Kingdom CNRS Loria UMR 7503 Vandoeuvre-lès-Nancy F-54500 France Université Catholique de Louvain ICTEAM B-1348 Louvain-la-Neuve Belgium
We propose a new measure for privacy of votes. Our measure relies on computational conditional entropy, an extension of the traditional notion of entropy that incorporates both informationtheoretic and computational a... 详细信息
来源: 评论
Cookie-based privacy issues on google services  12
Cookie-based privacy issues on google services
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Toubiana, Vincent Verdot, Vincent Christophe, Benoit Bell Labs Research Alcatel-Lucent Bell Labs France Route de Villejust Nozay91620 France
With the success of Web applications, most of our data is now stored on various third-party servers where they are processed to deliver personalized services. Naturally, we must be authenticated to access this persona... 详细信息
来源: 评论
Revisiting link privacy in social networks  12
Revisiting link privacy in social networks
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Effendy, Suhendry Yap, Roland H.C. Halim, Felix School of Computing National University of Singapore 13 Computing Drive Singapore Singapore
In this paper, we revisit the problem of the link privacy attack in online social networks. In the link privacy attack, it turns out that by bribing or compromising a small number of nodes (users) in the social networ... 详细信息
来源: 评论
SWIPE: Eager Erasure of Sensitive data in Large Scale Systems Software  12
SWIPE: Eager Erasure of Sensitive Data in Large Scale System...
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Gondi, Kalpana Bisht, Prithvi Venkatachari, Praveen Sistla, A. Prasad Venkatakrishnan, V.N. Department of Computer Science University of Illinois Chicago United States
We describe SWIPE, an approach to reduce the life time of sensitive, memory resident data in large scale applications written in C. In contrast to prior approaches that used a delayed or lazy approach to the problem o... 详细信息
来源: 评论
Quantitative access control with partially-observable Markov decision processes  12
Quantitative access control with partially-observable Markov...
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Martinelli, Fabio Morisset, Charles Security Group IIT-CNR Pisa Italy
This paper presents a novel access control framework reducing the access control problem to a traditional decision problem, thus allowing a policy designer to reuse tools and techniques from the decision theory. We pr... 详细信息
来源: 评论
The privacy in the Time of the Internet: Secrecy vs Transparency  12
The Privacy in the Time of the Internet: Secrecy vs Transpar...
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Pontual, Murillo Gampe, Andreas Chowdhury, Omar Kone, Bazoumana Ashik, Md. Shamim Winsborough, William H. The University of Texas at San Antonio United States
In the current time of the Internet, specifically with the emergence of social networking, people are sharing both sensitive and non-sensitive information among each other without understanding its consequences. Feder... 详细信息
来源: 评论
Stalking Online: on User privacy in Social Networks  12
Stalking Online: on User Privacy in Social Networks
收藏 引用
2nd acm conference on data and application security and privacy, CODASPY'12
作者: Yang, Yuhao Lutes, Jonathan Li, Fengjun Luo, Bo Liu, Peng Department of Eecs The University of Kansas LawrenceKS United States College of Ist The Pennsylvania State University University ParkPA United States
With the extreme popularity of Web and online social networks, a large amount of personal information has been made available over the Internet. On the other hand, advances in information retrieval, data mining and kn... 详细信息
来源: 评论