咨询与建议

限定检索结果

文献类型

  • 559 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 422 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 104 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 21 篇 电气工程
    • 12 篇 控制科学与工程
    • 9 篇 安全科学与工程
    • 5 篇 建筑学
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 114 篇 理学
    • 105 篇 数学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 5 篇 系统科学
    • 2 篇 物理学
  • 33 篇 管理学
    • 21 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 59 篇 privacy
  • 44 篇 security
  • 25 篇 data privacy
  • 22 篇 differential pri...
  • 21 篇 machine learning
  • 20 篇 access control
  • 14 篇 sensitive data
  • 11 篇 iot
  • 11 篇 android
  • 11 篇 mobile security
  • 10 篇 internet of thin...
  • 10 篇 deep learning
  • 9 篇 static analysis
  • 9 篇 blockchain
  • 8 篇 federated learni...
  • 7 篇 homomorphic encr...
  • 7 篇 web security
  • 7 篇 network security
  • 7 篇 cloud security
  • 7 篇 cloud computing

机构

  • 8 篇 purdue univ w la...
  • 6 篇 north carolina s...
  • 6 篇 rhein westfal th...
  • 6 篇 carnegie mellon ...
  • 5 篇 univ texas dalla...
  • 4 篇 stevens inst tec...
  • 4 篇 fraunhofer aisec...
  • 4 篇 purdue universit...
  • 4 篇 carnegie mellon ...
  • 4 篇 concordia univ m...
  • 3 篇 singapore inst t...
  • 3 篇 ericsson secur r...
  • 3 篇 purdue universit...
  • 3 篇 ecole polytech f...
  • 3 篇 umass boston bos...
  • 3 篇 univ illinois ur...
  • 3 篇 tech univ darmst...
  • 3 篇 king's college l...
  • 3 篇 university of pi...
  • 3 篇 university of te...

作者

  • 13 篇 bertino elisa
  • 11 篇 sandhu ravi
  • 7 篇 enck william
  • 6 篇 ghinita gabriel
  • 6 篇 meyer ulrike
  • 6 篇 kantarcioglu mur...
  • 5 篇 gupta maanak
  • 5 篇 wang lingyu
  • 4 篇 lee adam j.
  • 4 篇 conti mauro
  • 4 篇 murat kantarciog...
  • 4 篇 elisa bertino
  • 4 篇 liu fang
  • 4 篇 mittal sudip
  • 4 篇 gabriel ghinita
  • 4 篇 gunter carl a.
  • 4 篇 pourzandi makan
  • 4 篇 pretschner alexa...
  • 4 篇 wetzel susanne
  • 4 篇 majumdar suryadi...

语言

  • 555 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"
560 条 记 录,以下是551-560 订阅
排序:
privacy-Preserving Remote Diagnostics
Privacy-Preserving Remote Diagnostics
收藏 引用
14th acm conference on Computer and Communication security
作者: Brickell, Justin Porter, Donald E. Shmatikov, Vitaly Witchel, Emmett Univ Texas Austin Austin TX 78712 USA
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a branching diagnostic program with classific... 详细信息
来源: 评论
Adding user-level SPACe: security, privacy, and context to intelligent multimedia information architectures
Adding user-level SPACe: Security, privacy, and context to i...
收藏 引用
IEEE/WIC/acm International conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2006)
作者: Jutla, Dawn N. Kanevsky, Dimitri Sobey School of Business Saint Mary's University NS Canada Human Language Technologies T.J. Watson Research Centre IBM NY United States
We provide a unified architecture, called SPACe, for Secure, privacy-Aware, and Contextual multimedia systems in organizations. Many key and important architectural components already exist which contribute to a unifi... 详细信息
来源: 评论
A privacy-preserving interdomain audit framework
A privacy-preserving interdomain audit framework
收藏 引用
5th acm Workshop on privacy in Electronic Society, WPES 2006, Co-located with the 13th acm conference on Computer and Communications security, CCS 2006
作者: Lee, Adam J. Tabriz, Parisa Borisov, Nikita University of Illinois at Urbana-Champaign Urbana IL 61801 United States
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborative research environments like PlanetL... 详细信息
来源: 评论
Visualization for privacy compliance
Visualization for privacy compliance
收藏 引用
3rd International Workshop on Visualization for Computer security, VizSEC'06. Co-located with the 13th acm conference on Computer and Communications security, CCS'06
作者: Yee, George National Research Council Canada Building M-50 1200 Montreal Road Ottawa Ont. K1A 0R6 Canada
The growth of the Internet has been accompanied by the growth of e-services (e.g. e-commerce, e-health). This proliferation of e-services has put large quantities of consumer private information in the hands of the se... 详细信息
来源: 评论
acm International conference Proceeding Series - proceedings of the Second Symposium on Usable privacy and security, SOUPS 2006
ACM International Conference Proceeding Series - Proceedings...
收藏 引用
2nd Symposium on Usable privacy and security, SOUPS 2006
The proceedings contain 14 papers. The topics discussed include: aligning usability and security: a usability study of polaris;an empirical study of natural language parsing of privacy policy rules using the SPARCLE p... 详细信息
来源: 评论
Dynamic layer-2 VPN services for improving security in the Grid environment
收藏 引用
International conference on Emerging Trends in Information and Communication security
作者: Palmieri, Francesco Univ Naples Federico II Ctr Servizi Didatt Sci I-80126 Naples Italy
Pervasive and on-demand computing are now a reality, mainly in the scientific area, and the computational Grid concept is gaining popularity as a scalable way to deliver access to a wide range of distributed computing... 详细信息
来源: 评论
applications of secure electronic voting to automated privacy-preserving troubleshooting  05
Applications of secure electronic voting to automated privac...
收藏 引用
CCS 2005 - 12th acm conference on Computer and Communications security
作者: Huang, Qiang Jao, David Wang, Helen J. Princeton University United States Microsoft Research
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. This application poses interesting challen... 详细信息
来源: 评论
Generation of synthetic data sets for evaluating the accuracy of knowledge discovery systems
Generation of synthetic data sets for evaluating the accurac...
收藏 引用
KDD-2005: 11th acm SIGKDD International conference on Knowledge Discovery and data Mining
作者: Jeske, Daniel R. Samadi, Behrokh Lin, Pengyue J. Ye, Lan Cox, Sean Xiao, Rui Younglove, Ted Ly, Minh Holt, Douglas Rich, Ryan University of California Department of Statistics Riverside CA 92521 Lucent Technologies Bell Laboratories Holmdel NJ 07733 University of California Riverside CA
Information Discovery and Analysis Systems (IDAS) are designed to correlate multiple sources of data and use data mining techniques to identify potential significant events. application domains for IDAS are numerous a... 详细信息
来源: 评论
privacy and security in library RFID issues, practices, and architectures
Privacy and security in library RFID issues, practices, and ...
收藏 引用
proceedings of the 11th acm conference on Computer and Communications security, CCS 2004
作者: Molnar, David Wagner, David
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries are a fast growing application of RFID;... 详细信息
来源: 评论
data base management  75
Data base management
收藏 引用
1975 National Computer conference AFIPS 1975
作者: Codd, E.F. IBM Research Laboratory San JoseCA United States
data base management is in a state of ferment due to the emergence within the past few years of many new requirements. Amongst these requirements are the need to make application programs and terminal activities much ...
来源: 评论