咨询与建议

限定检索结果

文献类型

  • 559 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 422 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 22 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 555 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"
560 条 记 录,以下是451-460 订阅
排序:
Exploring dependency for query privacy protection in location-based services  13
Exploring dependency for query privacy protection in locatio...
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Chen, Xihui Pang, Jun Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg Luxembourg Faculty of Science Technology and Communication University of Luxembourg Luxembourg
Location-based services have been enduring a fast development for almost fifteen years. Due to the lack of proper privacy protection, especially in the early stage of the development, an enormous amount of user reques... 详细信息
来源: 评论
AppProfiler: A flexible method of exposing privacy-related behavior in android applications to end users  13
AppProfiler: A flexible method of exposing privacy-related b...
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Rosen, Sanae Qian, Zhiyun Morley Mao, Z. University of Michigan Ann Arbor MI United States
Although Android's permission system is intended to allow users to make informed decisions about their privacy, it is often ineffective at conveying meaningful, useful information on how a user's privacy might... 详细信息
来源: 评论
Engineering access control policies for provenance-aware systems  13
Engineering access control policies for provenance-aware sys...
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Sun, Lianshan Park, Jaehong Sandhu, Ravi Dept. of Computer Science Shaanxi Univ. of Sci. and Tech Xi'an Shaanxi China Insitute for Cyber Security Univ. of Texas at San Antonio San Antonio TX United States
Provenance is meta-data about how data items become what they are. A variety of provenance-aware access control models and policy languages have been recently discussed in the literature. However, the issue of eliciti... 详细信息
来源: 评论
Do online social network friends still threaten my privacy?  13
Do online social network friends still threaten my privacy?
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Labitzke, Sebastian Werling, Florian Mittag, Jens Hartenstein, Hannes Germany
A user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' priv... 详细信息
来源: 评论
Adaptive data protection in distributed sysems
Adaptive data protection in distributed sysems
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Squicciarini, Anna Cinzia Petracca, Giuseppe Bertino, Elisa College of Information Sciences and Technology Pennsylvania State University University Park PA 16802 United States Computer Science Department Purdue University West Lafayette IN 47906 United States
security is an important barrier to wide adoption of distributed systems for sensitive data storage and management. In particular, one unsolved problem is to ensure that customers data protection policies are honored,... 详细信息
来源: 评论
Accepting the inevitable: Factoring the user into home computer security  13
Accepting the inevitable: Factoring the user into home compu...
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Urbanska, Malgorzata Roberts, Mark Ray, Indrajit Howe, Adele Byrne, Zinta Department of Computer Science Colorado State University Fort Collins CO 80523 United States Department of Psychology Colorado State University Fort Collins CO 80523 United States
Home computer users present unique challenges to computer security. A user's actions frequently affect security without the user understanding how. Moreover, whereas some home users are quite adept at protecting t... 详细信息
来源: 评论
Geolocation of data in the cloud  13
Geolocation of data in the cloud
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Gondree, Mark Peterson, Zachary N. J. Naval Postgraduate School 1 University Circle Monterey CA 93940 United States
We introduce and analyze a general framework for authentically binding data to a location while providing strong assurances against cloud storage providers that (either accidentally or maliciously) attempt to relocate... 详细信息
来源: 评论
data usage control enforcement in distributed systems  13
Data usage control enforcement in distributed systems
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Kelbert, Florian Pretschner, Alexander Technische Universität München Garching bei München Germany
Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple co... 详细信息
来源: 评论
IBigTable: Practical data integrity for bigtable in public cloud  13
IBigTable: Practical data integrity for bigtable in public c...
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Wei, Wei Yu, Ting Xue, Rui North Carolina State University 890 Oval Drive Raleigh NC United States Chinese Academy of Sciences State Key Lab. of Information Security Institute of Information Engineering China
BigTable is a distributed storage system that is designed to manage large-scale structured data. Deploying BigTable in a public cloud is an economic storage solution to small businesses and researchers who need to dea... 详细信息
来源: 评论
FENCE: Continuous Access control enforcement in dynamic data stream environments  13
FENCE: Continuous Access control enforcement in dynamic data...
收藏 引用
3rd acm conference on data and application security and privacy, CODASPY 2013
作者: Nehme, Rimma V. Lim, Hyo-Sang Bertino, Elisa Microsoft Jim Gray Systems Lab United States Computer and Telecommunications Engineering Division Yonsei University Korea Republic of Department of Computer Science and Cyber Center Purdue University United States
In this paper, we address the problem of continuous access control enforcement in dynamic data stream environments, where both data and query security restrictions may potentially change in realtime. We present FENCE ... 详细信息
来源: 评论