掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
计算机、自动化
>
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
召开年:
召开地:
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
相关中文期刊
程序员:游戏创造
软件学报
计算机技术与发展
传感器世界
直通VIP
电脑入门
办公自动化(综合版)
计算机辅助设计与图形学学报
音响改装技术
课堂内外·中学生电脑
更多>>
相关外文期刊
Journal of defense modeling and simulatio
Journal of computer information systems
Neural processing letters
History and Computing
Foundations and Trends in Computer Graphics and Vision
Virus Bulletin
Future generation computer systems
International journal of swarm intelligence research
Science of Computer Programming
Reliable Computing
更多>>
相关中文会议
2007中国石油、石化、化工自动化及仪表控制技术研讨会
“面向新世纪中国机器人产业化发展论坛”大会
2013中国自动化学会华东六省一市年会(CETCU 2013)
全国第六届计算语言学联合学术会议
全国第二届嵌入式技术联合学术会议
第五届全国信息检索学术会议CCIR2009
第三届机器人产业链创新与发展及科技成果产业化推进科技论坛
OA’2011办公自动化国际学术研讨会
中国电机工程学会能源与信息专委会电磁脉冲与信息系统防护学术委员会2006年学术年会
全国第二届信息隐藏学术研讨会
更多>>
相关外文会议
Ultraviolet Atmospheric and Space Remote Sensing: Methods and Instrumentation II
Progress in cryptology : INDOCRYPT 2008
IFIP 17th World Computer Congress - TC8 Stream on Information Systems: The e-Business Challenge Aug 25-30, 2002 Montreal, Quebec, Canada
Electrochemical nano/bio sensors 2
Proceedings of the 13th Annual ACM(Association for Computing Machinery) Symposium on User Interface Software and Technology(UIST) Vol.2 No.2 Nov 5-8, 2000, San Diego, California
Justifying and Selecting Innovation Projects, 2005
GI(Gesellschaft fur Informatik e.V.) Dagstuhl Seminars; 20040413-16; Dagstuhl(DE)
Shaping the future of ICT research : Methods and approaches
Association for Computing Machinery(ACM) Annual Symposium on Applied Computing(SAC 2004) vol.1; 20040314-17; Nicosia(CY)
Polarization and Remote Sensing
更多>>
热门会议
Meeting of the internet engineering task force;IETF
日本建築学会;日本建築学会大会
日本建築学会(Architectural Institute of Japan);日本建築学会年度大会
日本建築学会学術講演会;日本建築学会
日本建築学会2010年度大会(北陸)
Korean Society of Noise & Vibration Control;Institute of Noise Control Engineering;International congress and exposition on noise control engineering;ASME Noise Control & Acoustics Division
土木学会;土木学会全国大会年次学術講演会
応用物理学会秋季学術講演会;応用物理学会
総合大会;電子情報通信学会
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)论文集
更多>>
最新会议
2011 IEEE Cool Chips XIV
International workshop on Java technologies for real-time and embedded systems
Supercomputing '88. [Vol.1]. Proceedings.
RILEM Proceedings PRO 40; International RILEM Conference on the Use of Recycled Materials in Buildings and Structures vol.1; 20041108-11; Barcelona(ES)
International Workshop on Hybrid Metaheuristics(HM 2007); 20071008-09; Dortmund(DE)
The 57th ARFTG(Automatic RF Techniques Group) Conference, May 25, 2001, Phoenix, AZ
Real Time Systems Symposium, 1989., Proceedings.
Conference on Chemical and Biological Sensing V; 20040412-20040413; Orlando,FL; US
American Filtration and Separations Society conference
Combined structures congress;North American steel construction conference;NASCC
更多>>
全选(
0
)
清除
导出
1.
Remembrance of Local Information Status for Enforcing Robustness of Policy-Exchanged Strategies for Trust Negotiation
机译:
记住本地信息状态以增强策略交换策略的信任协商的鲁棒性
作者:
Yunxi Zhang
;
Mundy Darren
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
automatic policy cyclic dependencies detection;
bilateral trust relationship;
complex access control approach;
enforce policy-exchanged strategy robustness;
local information status remembrance;
repetitive credential request attacks;
trust negotiation;
vulnerability issues;
Authorization;
Context;
Educational institutions;
IEEE Potentials;
Protocols;
Web services;
Policy Cyclic Dependencies;
Policy-exchanged strategies;
Remembrance of Local Information Status;
Repetitive Credential Request Attacks;
2.
In-Map/In-Reduce: Concurrent Job Execution in MapReduce
机译:
地图内/缩小内:MapReduce中的并发作业执行
作者:
Idris Muhammad
;
Hussain Shiraz
;
Sungyoung Lee
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
cloud computing;
parallel programming;
public domain software;
resource allocation;
scheduling;
Big Data processing mechanism;
HDFS;
Hadoop based Map Reduce;
In-Map/In-Reduce;
MR;
MapReduce jobs scheduling;
cloud resources;
concurrent job execution;
data intensive systems;
dynamic resource allocation;
multiple parallel algorithms;
task assignment;
Algorithm design and analysis;
Big data;
Clustering algorithms;
Distributed databases;
Educational institutions;
Partitioning algorithms;
Big Data;
Data Intensive Co;
3.
Practical Assessment of Biba Integrity for TCG-Enabled Platforms
机译:
对启用了TCG的平台的Biba完整性的实际评估
作者:
Sassu Roberto
;
Ramunno Gianluca
;
Lioy Antonio
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data integrity;
trusted computing;
CW-Lite requirements;
PRIMA;
TCG-enabled platforms;
application integrity;
hardware component fingerprints;
policy-reduced integrity measurement architecture;
potentially malicious processes;
practical biba integrity assessment;
software component fingerprints;
trusted computing group;
Analytical models;
Data models;
Kernel;
Load modeling;
Security;
Time measurement;
Biba integrity;
Remote attestation;
information flow;
4.
Network Traffic Anomaly Detection Using Adaptive Density-Based Fuzzy Clustering
机译:
基于自适应密度模糊聚类的网络流量异常检测
作者:
Duo Liu
;
Chung-Horng Lung
;
Seddigh Nabil
;
Nandy Biswajit
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data handling;
fuzzy set theory;
pattern clustering;
statistical analysis;
FCM clustering;
adaptive density-based fuzzy clustering;
data distribution;
fuzzy C-means clustering;
network traffic anomaly detection;
network traffic data;
spatial information;
statistical characteristics;
Conferences;
Privacy;
Security;
Fuzzy C-means;
Network anomaly detection;
Partitional clustering;
Possibilistic clustering;
5.
An On-Line Anomaly Detection Method Based on a New Stationary Metric - Entropy-Ratio
机译:
基于新的平稳度量熵比的在线异常检测方法
作者:
Ziyu Wang
;
Jiahai Yang
;
Fuliang Li
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
IP networks;
computer network security;
entropy;
least mean squares methods;
CEGI-6IX synthetic data set;
CERNET2 synthetic data set;
forward linear predictor;
large-IP flows;
least mean square algorithm;
online LMS-FLP detector;
online anomaly detection method;
small-IP flows;
stationary entropy-ratio metric;
zero-day attack detection capability;
Detectors;
Educational institutions;
Entropy;
Equations;
IP networks;
Mathematical model;
Vectors;
Entropy-Ratio;
Forward Linear Predictor;
Least Mean Square;
anomaly detecti;
6.
Performance Analysis on M2M Communication Network Based on Stochastic Network Calculus
机译:
基于随机网络演算的M2M通信网络性能分析
作者:
Zhou Tao
;
Wang Quan
;
Wang Gao-Cai
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
calculus of communicating systems;
computer networks;
deconvolution;
stochastic processes;
M2M communication network;
Poisson process model;
backlog bound;
machine-to-machine communication networks;
network deployment;
network node;
performance analysis framework;
stochastic arrival curve;
stochastic network calculus;
stochastic service curve deconvolution;
time interval;
Artificial neural networks;
Calculus;
Communication networks;
Delays;
Mobile handsets;
Quality of service;
Stochastic processes;
M2M (Machine-to-Ma;
7.
Identifying P2P Network Activities on Encrypted Traffic
机译:
识别加密流量上的P2P网络活动
作者:
Xiaolei Wang
;
Yuexiang Yang
;
Jie He
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet;
computer network security;
cryptography;
hidden Markov models;
peer-to-peer computing;
telecommunication traffic;
time series;
ISP;
Internet service producers;
Internet traffic;
P2P network activities identification;
P2P traffic;
TeamViewer;
encrypted traffic;
forensic investigation context;
hidden Markov model;
illegal P2P applications;
peer-to-peer traffic;
statistical properties;
time series characteristics;
Analytical models;
Computational modeling;
Cryptography;
Hidden Markov models;
Probability;
Time ser;
8.
Mining Specification of Insecure Browser Extension Behavior
机译:
不安全的浏览器扩展行为的挖掘规范
作者:
Hongbin Pei
;
Xiaohong Li
;
Guangquan Xu
;
Zhiyong Feng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data mining;
online front-ends;
security of data;
behavior graphs;
graph mining algorithm;
insecure browser extension behavior identification;
mining specification;
Browsers;
Facebook;
Instruments;
Malware;
Monitoring;
Runtime;
Browser extension;
Firefox;
behavior analysis;
graph mining;
security;
9.
Digital Trust - Trusted Computing and Beyond: A Position Paper
机译:
数字信任-可信计算及超越:立场文件
作者:
Akram Raja Naeem
;
Ko Ryan K. L.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
computer network security;
data privacy;
mobile computing;
trusted computing;
Internet;
TPM specifications;
cloud computing;
cyberphysical systems;
digital resource management;
digital trust evolution;
heterogeneous domains;
interconnected networks;
mobile computing;
physical societal notions;
secure computing;
trusted computing;
trusted platform module;
Computer architecture;
Computers;
Engines;
Mobile communication;
Proposals;
Security;
Semantic Web;
Cloud Computing;
Cyber-Physical System;
Embedded Devi;
10.
Survey of Integrity Detection Methods in Internet of Things
机译:
物联网完整性检测方法研究
作者:
Chaoliang Li
;
Qin Li
;
Guojun Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet of Things;
data integrity;
radiofrequency identification;
warehouse automation;
Internet of Things;
IoT;
electronic equipments;
integrity detection methods;
modern logistic warehouse;
tag price;
Detection algorithms;
Educational institutions;
Internet;
Logistics;
Privacy;
Protocols;
Radiofrequency identification;
Internet of Things (IoT);
integrity detection;
survey;
11.
TTPCookie: Flexible Third-Party Cookie Management for Increasing Online Privacy
机译:
TTPCookie:灵活的第三方Cookie管理,以提高在线隐私
作者:
Javed Azhar
;
Merz Christian
;
Schwenk Joerg
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
data privacy;
online front-ends;
Mozilla Firefox add-on;
TTPCookie;
Web advertisers;
fine-grained protocol;
flexible third-party cookie management;
online privacy;
per-site cookie management protocol;
tracking activities;
user surfing behaviour tracking;
Browsers;
Data collection;
Data privacy;
Databases;
Privacy;
Proposals;
Web pages;
12.
TEEI - A Mobile Security Infrastructure for TEE Integration
机译:
TEEI-用于TEE集成的移动安全基础架构
作者:
Hongfeng Chai
;
Zhijun Lu
;
Qingyang Meng
;
Jun Wang
;
Xiubang Zhang
;
Zhijian Zhang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
mobile computing;
mobile handsets;
security of data;
service-oriented architecture;
trusted computing;
virtual machines;
virtual private networks;
ITS framework;
SOA-like internal trusted service framework;
TEE fragmentation and control problem;
TEE integration;
TEEI;
TVM technology;
dual OS security solution;
mobile payment;
mobile security infrastructure;
privacy data fields;
trusted execution environment integration;
trusted virtual machine technology;
virtual network protocol;
Hardware;
Logic gates;
Mobile commun;
13.
Temporal Access Control with User Revocation for Cloud Data
机译:
用户撤销云数据的临时访问控制
作者:
Balani Nihal
;
Ruj Sushmita
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
cloud computing;
cryptography;
data protection;
storage management;
access data protection;
attribute-based encryption;
cloud data storage;
communication costs;
decryption outsourcing;
proxy server;
temporal access control scheme;
user revocation;
Access control;
Cloud computing;
Encryption;
Polynomials;
Servers;
Access Control;
CP-ABE;
Cloud Storage;
Revocation;
Temporal Access Control;
14.
Efficiently Attribute-Based Access Control for Mobile Cloud Storage System
机译:
高效的基于属性的移动云存储系统访问控制
作者:
Zhiquan Lv
;
Jialin Chi
;
Min Zhang
;
Dengguo Feng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
cloud computing;
cryptography;
mobile computing;
ABE-based access control schemes;
KP-ABE scheme;
attribute-based encryption;
collusion attack;
computation tasks;
decryption;
key-policy ABE;
mobile cloud storage environment;
mobile cloud storage system;
mobile devices;
outsourced key generation;
outsourced services;
revocation method;
secure attribute-based access control scheme;
unauthorized cloud servers;
user data security;
Access control;
Cloud computing;
Mobile communication;
Public key;
Servers;
KP-;
15.
vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud
机译:
vPatcher:基于VMI的透明数据修补以保护云中的软件
作者:
Hao Zhang
;
Lei Zhao
;
Lai Xu
;
Lina Wang
;
Deming Wu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
security of data;
system monitoring;
virtual machines;
VMI-based transparent data patching;
cloud computing;
fine-grained system semantics;
hypervisor;
network connection monitoring;
protected guest systems;
secure software;
vPatcher;
virtual machine introspection;
vulnerability signatures;
vulnerable programs;
Availability;
Data structures;
Inspection;
Kernel;
Ports (Computers);
Semantics;
Virtual machining;
Hot patching;
Transparency;
data patching;
exploit defense;
virtual machine monitoring;
16.
Convergence of True Cooperations in Bayesian Reputation Game
机译:
贝叶斯声誉博弈中真正合作的收敛
作者:
Jooyoung Lee
;
Oh Jae C.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Bayes methods;
Internet of Things;
data privacy;
game theory;
software agents;
Bayesian reputation game;
Internet of things;
distributed entities;
distributed environment;
dynamic type change;
private information;
self-interested entities;
software agents;
true cooperation convergence;
Bayes methods;
Convergence;
Cost function;
Games;
Peer-to-peer computing;
Security;
Social network services;
Bayesian Game Theory;
Cooperation;
Infinitely Repeated Games;
Reputation Games;
Trust;
17.
Untrusted User Detection in Microblogs
机译:
微博中不受信任的用户检测
作者:
Zidan Yu
;
Huiqun Yu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
graph theory;
social networking (online);
trusted computing;
hybrid graph;
information sharing;
label propagation algorithm;
microblogs;
social communication;
social networking sites;
topics;
trust model;
trust relationship;
tweets;
untrusted user detection;
Algorithm design and analysis;
Classification algorithms;
Educational institutions;
Semantics;
Twitter;
Vectors;
hybrid graph;
label propagation;
trust model;
untrusted user detection;
18.
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs
机译:
基于议价的MANET合作认证动态决策
作者:
Liu Licai
;
Yin Lihua
;
Guo Yunchuan
;
Fang Bingxing
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cooperative communication;
decision making;
game theory;
message authentication;
mobile ad hoc networks;
probability;
telecommunication security;
MANET;
bargaining-based dynamic decision;
bargaining-based dynamic game model;
cooperative authentication;
dynamic decision-making;
location privacy;
mobile ad hoc networks;
network lifetime;
perfect Bayesian Nash equilibrium;
resources consumption;
subgame perfect Nash equilibriums;
Ad hoc networks;
Authentication;
Games;
Mobile computing;
Principal component analysis;
Priv;
19.
An Effective Path Load Balancing Mechanism Based on SDN
机译:
一种基于SDN的有效路径负载均衡机制
作者:
Jun Li
;
Xiangqing Chang
;
Yongmao Ren
;
Zexin Zhang
;
Guodong Wang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
computer network reliability;
fuzzy set theory;
resource allocation;
software defined networking;
telecommunication links;
telecommunication traffic;
transport protocols;
FSEM;
OpenFlow switches;
breakdown avoidance;
central SDN controller;
dynamically adjusted paths;
flow-handling rules;
fuzzy synthetic evaluation mechanism;
link failure;
link utilization optimization;
network performance improvement;
network reliability;
network traffic allocation;
path array;
path load balancing mechanism;
software defined networ;
20.
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones
机译:
系统分析和检测Android智能手机中的配置错误
作者:
Zhihui Han
;
Liang Cheng
;
Yang Zhang
;
Shuke Zeng
;
Yi Deng
;
Xiaoshan Sun
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
logic programming;
security of data;
smart phones;
Android manifest file;
Android permission model;
Android smartphones;
SADroid;
application code;
intent-based mechanism;
interapplication communication;
intraapplication communication;
logic predicates;
logic-programming-based approach;
misconfiguration vulnerability;
misconfiguration vulnerability detection;
permission-based security model;
static technique;
systematic analysis;
Analytical models;
Google;
Java;
Prototypes;
Receivers;
Security;
Smart phones;
Android sma;
21.
Encrypted Program Execution
机译:
加密程序执行
作者:
Zhuravlev Dmytro
;
Samoilovych Ihor
;
Orlovskyi Roman
;
Bondarenko Ievgen
;
Lavrenyuk Yaroslav
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
cryptography;
memory architecture;
program diagnostics;
virtual machines;
cloud computing;
encrypted program execution;
encrypted program transmission;
encrypted space;
homomorphic cryptography;
machine architecture;
memory access;
outsourcing computation;
performance improvement;
program code;
program decryption;
secure arbitrary program execution;
termination problem;
virtual machine;
Encryption;
Memory management;
Radiation detectors;
Servers;
encrypted memory access;
encrypted program execution;
hom;
22.
HBaseSpatial: A Scalable Spatial Data Storage Based on HBase
机译:
HBaseSpatial:基于HBase的可扩展空间数据存储
作者:
Ningyu Zhang
;
Guozhou Zheng
;
Huajun Chen
;
Jiaoyan Chen
;
Xi Chen
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Big Data;
public domain software;
query processing;
relational databases;
storage management;
visual databases;
Big vector spatial Data storage;
DBMS;
HBaseSpatial;
MongoDB;
Mysql;
distributed storage model;
high insertion rates;
index model;
key-value storage;
open source relational database systems;
query requirements;
scalable spatial data storage;
Data models;
Distributed databases;
Indexes;
Memory;
Relational databases;
Spatial databases;
Vectors;
Big Spatial Data;
HBase;
23.
Unified Model for Data Security - A Position Paper
机译:
统一的数据安全模型-立场文件
作者:
Akram Raja Naeem
;
Ko Ryan K. L.
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
cryptography;
data integrity;
data privacy;
IT systems;
UMDS;
business objectives;
comprehensive data security;
data access;
data auditability;
data authorisation;
data availability;
data collection;
data communication;
data confidentiality;
data integrity;
data modification;
data privacy;
data quality;
data sharing;
data stakeholders;
data storage;
data use;
holistic approach;
information technology systems;
unified model-for-data security;
Access control;
Computers;
Cryptography;
Data models;
Software;
Access;
24.
Research of Provenance Storage in Cloud Computing Environment
机译:
云计算环境下的源存储研究
作者:
Zhangxuan Luo
;
Guoyan Xu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
distributed processing;
optimisation;
query processing;
storage management;
cloud computing;
data storage;
distributed provenance storage;
long integer coding;
matching problem;
optimization;
query efficiency;
Computers;
Dictionaries;
Educational institutions;
Encoding;
Indexes;
Memory;
Resource description framework;
RDF;
cloud computing;
data storage;
index structure;
provenance data;
25.
ONHelp: Components in Building Secure Cloud Based on OpenNebula
机译:
ONHelp:基于OpenNebula构建安全云的组件
作者:
Kao Zhao
;
Hai Jin
;
Deqing Zou
;
Weiqi Dai
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
cloud computing;
operating systems (computers);
public domain software;
virtual machines;
ONHelp;
OpenNebula;
building secure cloud components;
cloud antivirus;
cloud computing development;
cloud computing environment;
cloud service;
open-source cloud computing software platforms;
secure cloud environment;
service-level fault tolerant service;
software platforms;
trustworthiness attestation;
virtual machines;
Cloud computing;
Fault tolerance;
Fault tolerant systems;
Monitoring;
Security;
Semantics;
Cloud Computing;
Ope;
26.
Towards Robust and Effective Trust Management for Security: A Survey
机译:
迈向可靠而有效的安全信任管理调查
作者:
Dongxia Wang
;
Muller Tim
;
Yang Liu
;
Jie Zhang
会议名称:
《》
|
2014年
关键词:
security of data;
trusted computing;
effective trust management system;
representative attacks;
security problems;
Access control;
Authentication;
Data privacy;
Measurement;
Robustness;
Routing;
Robustness;
Security;
Survey;
Trust;
Trust Management;
27.
Aeromancer: A Workflow Manager for Large-Scale MapReduce-Based Scientific Workflows
机译:
Aeromancer:用于基于MapReduce的大规模科学工作流程的工作流程管理器
作者:
Mohamed N.
;
Maji Nabanita
;
Jing Zhang
;
Timoshevskaya Nataliya
;
Wu-chun Feng
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
bioinformatics;
client-server systems;
cloud computing;
data analysis;
directed graphs;
electronic data interchange;
parallel processing;
pipeline processing;
resource allocation;
workflow management software;
Aeromancer;
DAG;
automatic data-dependency;
big data;
bioinformatics pipelines;
client resources;
client-cloud computing model;
data-intensive workflows;
data-transfer handling;
directed-acyclic graphs;
feature-rich workflow manager;
hybrid computing environments;
intraflow on-demand cluster provisioning;
large-;
28.
Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords
机译:
基于可用和安全的基于识别的图形密码的挑战集设计和用户指南
作者:
Aljahdali Hani Moaiteq
;
Poet Ron
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
authorisation;
alphanumeric passwords;
challenge set designs;
culturally familiar decoys;
culturally familiar pictures;
culturally unfamiliar decoys;
educated guessing attack;
graphical password guidelines;
password memorability;
usable secured recognition-based graphical passwords;
user authentication;
user guidelines;
Authentication;
Cultural differences;
Guidelines;
Standards;
Training;
Usability;
Recognition-based graphical password;
authentication;
cultural familiarity;
security;
usability;
29.
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning
机译:
利用多视图半监督学习设计电子邮件分类系统
作者:
Wenjuan Li
;
Weizhi Meng
;
Zhiyuan Tan
;
Yang Xiang
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
learning (artificial intelligence);
pattern classification;
unsolicited e-mail;
classification model;
email classification system;
labeled data;
multiview data;
multiview disagreement-based semisupervised learning;
single view data;
spam;
unlabeled data;
Data models;
Electronic mail;
Feature extraction;
Semisupervised learning;
Supervised learning;
Support vector machines;
Training;
Email Classification;
Machine Learning Applications;
Multi-View;
Network Security;
Semi-Supervised Learning;
30.
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
机译:
物联网环境下资源观察的鲁棒认证方案
作者:
Jan Mian Ahmad
;
Nanda Priyadarsi
;
Xiangjian He
;
Zhiyuan Tan
;
Ren Ping Liu
会议名称:
《2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications》
|
2014年
关键词:
Internet of Things;
authorisation;
Internet of things environment;
computationally complex algorithms;
digital world;
interoperable operations;
participating entities;
physical objects;
resource consuming secure algorithms;
robust authentication scheme;
seamless integration;
security features;
Authentication;
Cryptography;
Internet;
Payloads;
Robustness;
Servers;
Authentication;
CoAP;
Conditional Option;
Internet of Things (IoT);
Resource Observation;
意见反馈
回到顶部
回到首页