International Conference on Secure and Trust Computing, Data Management and Applications最新文献

筛选
英文 中文
IMS Session Management Based on Usage Control 基于使用控制的IMS会话管理
Georgios Karopoulos, F. Martinelli
{"title":"IMS Session Management Based on Usage Control","authors":"Georgios Karopoulos, F. Martinelli","doi":"10.1007/978-3-642-22339-6_9","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_9","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"51 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124533623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements SecPAL4DSA:用于指定数据共享协议的策略语言
B. Aziz, Á. Arenas, Michael D. Wilson
{"title":"SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements","authors":"B. Aziz, Á. Arenas, Michael D. Wilson","doi":"10.1007/978-3-642-22339-6_4","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_4","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams 使用Bloom过滤器挖掘数据流中Top-k频繁项集
Younghee Kim, K. Cho, J. Yoon, I. Kim, U. Kim
{"title":"Using Bloom Filters for Mining Top-k Frequent Itemsets in Data Streams","authors":"Younghee Kim, K. Cho, J. Yoon, I. Kim, U. Kim","doi":"10.1007/978-3-642-22339-6_25","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_25","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource Pool 基于云的虚拟化资源池自适应全局最优调度
Lingli Deng, Qing Yu, Jin Peng
{"title":"Adaptive Optimal Global Resource Scheduling for a Cloud-Based Virtualized Resource Pool","authors":"Lingli Deng, Qing Yu, Jin Peng","doi":"10.1007/978-3-642-22339-6_28","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_28","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Network Data Abstraction Method for Data Set Verification 一种数据集验证的网络数据抽象方法
Jaeik Cho, Kyuwon Choi, Taeshik Shon, Jongsub Moon
{"title":"A Network Data Abstraction Method for Data Set Verification","authors":"Jaeik Cho, Kyuwon Choi, Taeshik Shon, Jongsub Moon","doi":"10.1007/978-3-642-22339-6_7","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_7","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131648000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion 多方向分数水平融合增强二维掌相量
L. Leng, Jiashu Zhang, Gao Chen, M. Khan, Ping Bai
{"title":"Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion","authors":"L. Leng, Jiashu Zhang, Gao Chen, M. Khan, Ping Bai","doi":"10.1007/978-3-642-22339-6_15","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_15","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Software Architecture for Introducing Trust in Java-Based Clouds 在基于java的云中引入信任的软件体系结构
Siegfried Podesser, Ronald Toegl
{"title":"A Software Architecture for Introducing Trust in Java-Based Clouds","authors":"Siegfried Podesser, Ronald Toegl","doi":"10.1007/978-3-642-22339-6_6","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_6","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining 空间共定位模式挖掘的最大团生成算法
Seung Kwan Kim, Younghee Kim, U. Kim
{"title":"Maximal Cliques Generating Algorithm for Spatial Co-location Pattern Mining","authors":"Seung Kwan Kim, Younghee Kim, U. Kim","doi":"10.1007/978-3-642-22339-6_29","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_29","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"120 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An RSN Tool : A Test Dataset Generator for Evaluating RFID Middleware RSN工具:用于评估RFID中间件的测试数据集生成器
W. Ryu, Joonho Kwon, B. Hong
{"title":"An RSN Tool : A Test Dataset Generator for Evaluating RFID Middleware","authors":"W. Ryu, Joonho Kwon, B. Hong","doi":"10.1007/978-3-642-22339-6_26","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_26","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Secret Sharing Schemes 高效的秘密共享方案
Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun
{"title":"Efficient Secret Sharing Schemes","authors":"Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun","doi":"10.1007/978-3-642-22339-6_14","DOIUrl":"https://doi.org/10.1007/978-3-642-22339-6_14","url":null,"abstract":"","PeriodicalId":339788,"journal":{"name":"International Conference on Secure and Trust Computing, Data Management and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124514079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信