Proceedings of the first ACM conference on Data and application security and privacy最新文献

筛选
英文 中文
Session details: Novel models and systems for access control 会议细节:访问控制的新模型和系统
D. Thomsen
{"title":"Session details: Novel models and systems for access control","authors":"D. Thomsen","doi":"10.1145/3253030","DOIUrl":"https://doi.org/10.1145/3253030","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115213279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Secure provenance 会话详细信息:安全来源
R. Sandhu
{"title":"Session details: Secure provenance","authors":"R. Sandhu","doi":"10.1145/3253028","DOIUrl":"https://doi.org/10.1145/3253028","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Security and privacy techniques for social networks 会议细节:社交网络的安全和隐私技术
Murat Kantarcioglu
{"title":"Session details: Security and privacy techniques for social networks","authors":"Murat Kantarcioglu","doi":"10.1145/3253025","DOIUrl":"https://doi.org/10.1145/3253025","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Novel applications of privacy techniques 会议细节:隐私技术的新应用
Keke Chen
{"title":"Session details: Novel applications of privacy techniques","authors":"Keke Chen","doi":"10.1145/3253033","DOIUrl":"https://doi.org/10.1145/3253033","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Privacy threats and protection techniques 会话详细信息:隐私威胁和保护技术
B. Carminati
{"title":"Session details: Privacy threats and protection techniques","authors":"B. Carminati","doi":"10.1145/3253029","DOIUrl":"https://doi.org/10.1145/3253029","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126831169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Insider threats and data leakage 会话详细信息:内部威胁和数据泄漏
R. Krishnan
{"title":"Session details: Insider threats and data leakage","authors":"R. Krishnan","doi":"10.1145/3253026","DOIUrl":"https://doi.org/10.1145/3253026","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Secure data outsourcing 会话详细信息:安全数据外包
Gabriel Ghinita
{"title":"Session details: Secure data outsourcing","authors":"Gabriel Ghinita","doi":"10.1145/3253032","DOIUrl":"https://doi.org/10.1145/3253032","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Performance evaluation and enhancement 会话细节:性能评估和增强
J. Joshi
{"title":"Session details: Performance evaluation and enhancement","authors":"J. Joshi","doi":"10.1145/3253027","DOIUrl":"https://doi.org/10.1145/3253027","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126336654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Invited industry and application papers 会议详情:邀请行业和应用论文
E. Bertino
{"title":"Session details: Invited industry and application papers","authors":"E. Bertino","doi":"10.1145/3253031","DOIUrl":"https://doi.org/10.1145/3253031","url":null,"abstract":"","PeriodicalId":448428,"journal":{"name":"Proceedings of the first ACM conference on Data and application security and privacy","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信