咨询与建议

限定检索结果

文献类型

  • 559 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 422 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 22 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 555 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"
560 条 记 录,以下是381-390 订阅
排序:
Rapid screening of transformed data leaks with efficient algorithms and parallel computing  15
Rapid screening of transformed data leaks with efficient alg...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Shu, Xiaokui Zhang, Jing Yao, Danfeng Daphne Feng, Wu-Chun Department of Computer Science Virginia Tech BlacksburgVA United States
The leak of sensitive data on computer systems poses a seri- ous threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the con- tent in storage and transmission,... 详细信息
来源: 评论
CryptStream: Cryptographic access controls for streaming data  15
CryptStream: Cryptographic access controls for streaming dat...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Thoma, Cory Lee, Adam J. Labrinidis, Alexandros University of Pittsburgh PittsburghPA15260 United States
With data becoming available in larger quantities and at higher rates, new data processing paradigms have been pro- posed to handle large and fast data. data Stream Processing is one such paradigm wherein transient da... 详细信息
来源: 评论
DEMO: NFCGate - An NFC relay application for android  8
DEMO: NFCGate - An NFC relay application for android
收藏 引用
8th acm conference on security and privacy in Wireless and Mobile Networks, WiSec 2015
作者: Maass, Max Müller, Uwe Schons, Tom Wegemer, Daniel Schulz, Matthias Secure Mobile Networking Lab. Technische Universität Darmstadt Darmstadt Germany
Near Field Communication (NFC) is a technology widely used for security-critical applications like access control or payment systems. Many of these systems rely on the security assumption that the card has to be in cl... 详细信息
来源: 评论
CODASPY 2014 - proceedings of the 4th acm conference on data and application security and privacy
CODASPY 2014 - Proceedings of the 4th ACM Conference on Data...
收藏 引用
4th acm conference on data and application security and privacy, CODASPY 2014
The proceedings contain 41 papers. The topics discussed include: on the suitability of dissemination-centric access control systems for group-centric sharing;Streamforce: outsourcing access control enforcement for str...
来源: 评论
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis  15
Can't you hear me knocking: Identification of user actions o...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Conti, Mauro Mancini, Luigi V. Spolaor, Riccardo Verde, Nino V. University of Padua Padua Italy Sapienza University of Rome Rome Italy
While smartphone usage become more and more pervasive, people start also asking to which extent such devices can be maliciously exploited as "tracking devices". The concern is not only related to an adversar... 详细信息
来源: 评论
StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications  15
StaDynA: Addressing the problem of dynamic code updates in t...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Zhauniarovich, Yury Ahmad, Maqsood Gadyatskaya, Olga Crispo, Bruno Massacci, Fabio University of Trento Trento Italy SnT University of Luxembourg Luxembourg Luxembourg DistriNet KU Leuven Leuven Belgium
Static analysis of Android applications can be hindered by the presence of the popular dynamic code update techniques: dynamic class loading and reflection. Recent Android mal- ware samples do actually use these mecha... 详细信息
来源: 评论
Tunably-oblivious memory: Generalizing ORAM to enable privacy-efficiency tradeoffs  15
Tunably-oblivious memory: Generalizing ORAM to enable privac...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Dautrich, Jonathan Ravishankar, Chinya Google Inc. IrvineCA United States Computer Science and Engineering University of California Riverside United States
We consider the challenge of providing privacy-preserving access to data outsourced to an untrusted cloud provider. Even if data blocks are encrypted, access patterns may leak valuable information. Oblivious RAM (ORAM... 详细信息
来源: 评论
Dimensions of risk in mobile applications: A user study  15
Dimensions of risk in mobile applications: A user study
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Jorgensen, Zach Chen, Jing Gates, Christopher S. Li, Ninghui Proctor, Robert W. Yu, Ting Department of Computer Science North Carolina State University RaleighNC United States Department of Psychological Sciences CERIAS Purdue University West LafayetteIN United States Department of Computer Science CERIAS Purdue University West LafayetteIN United States Qatar Computing Research Institute Doha Qatar
Mobile platforms, such as Android, warn users about the permissions an app requests and trust that the user will make the correct decision about whether or not to install the app. Unfortunately many users either ignor... 详细信息
来源: 评论
A Platform for Context-Aware application Development: PCAD
A Platform for Context-Aware Application Development: PCAD
收藏 引用
3rd International conference on Innovative Network Systems and applications (iNetSApp) held in conjunction with Federated conference on Computer Science and Information Systems (FedCSIS)
作者: Celikkan, Ufuk Kurtel, Kaan Izmir Univ Econ Dept Software Engn Sakarya Cad 156 TR-35330 Izmir Turkey
We propose a novel software platform based on the notion of context-awareness which allows rapid and easy development of context aware applications. One of the fundamental goals of the proposed platform is extensibili... 详细信息
来源: 评论
Virtual resource orchestration constraints in cloud infrastructure as a service  15
Virtual resource orchestration constraints in cloud infrastr...
收藏 引用
5th acm conference on data and application security and privacy, CODASPY 2015
作者: Bijon, Khalid Krishnan, Ram Sandhu, Ravi Institute for Cyber Security Univ of Texas at San Antonio United States
In an infrastructure as a service (IaaS) cloud, virtualized IT resources such as compute, storage and network are offered on demand by a cloud service provider (CSP) to its tenants (customers). A major problem for ent... 详细信息
来源: 评论