×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [5]
厦门大学 [1]
兰州理工大学 [1]
大连理工大学 [1]
北京航空航天大学 [1]
上海电子信息职业技术... [1]
更多...
内容类型
期刊论文 [5]
会议论文 [4]
学位论文 [1]
发表日期
2018 [4]
2017 [1]
2015 [2]
2014 [1]
2011 [1]
2009 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Behavior rhythm: An effective model for massive logs characterizing and security monitoring in cloud
会议论文
作者:
Qin, Tao
;
He, Chao
;
Jiang, Hezhi
;
Chen, Ruoya
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/19
Abnormal behavior
Behavior characteristic
Cloud securities
Cloud security managements
Command sequences
Concept of operations
Security monitoring
Xian Jiaotong University
Access control of cloud users credible behavior based on IPv6
会议论文
作者:
Cao, Sisi
;
Zheng, Wenbo
;
Mo, Shaocong
;
Jin, Xin
;
Dai, Chao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/26
Cloud computing securities
Extension headers
Indirect interactions
Information behavior
IPv6
Trust relationship
User behavior trusts
User's behavior trust
Enterprise security and privacy: Why adding IoT and big data makes it so much more difficult
会议论文
作者:
Duncan, Bob
;
Whittington, Mark
;
Chang, Victor
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Cloud ecosystems
Cloud securities
Enterprise security
Internet of thing (IOT)
Multi tenancies
Research questions
Security and privacy
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10726 LNCS, 页码: 278-298
作者:
Feng, H.
;
Liu, J.
;
Wu, Q.
;
Liu, W.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Access control
Cloud computing
Digital storage
Public key cryptography
Security of data
Attribute-based
Cloud computing securities
Encrypted data
Fine grained
Fully homomorphic encryption
Generic construction
Key encapsulation mechanisms
Predicate encryptions
Cryptography
Cooperative dynamic data possession scheme across a cloud storage environment
期刊论文
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 卷号: 57, 期号: 10, 页码: 1048-1055
作者:
Cao, Laicheng
;
He, Wenwen
;
Liu, Yufei
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Digital storage
Network security
Cloud service providers
Cloud storage securities
Cloud storage services
Cooperative dynamics
Dynamic data
Dynamic operations
Integrity verifications
Trusted third parties
Encryption algorithm supporting relational calculations in cloud computing
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2015, 卷号: 26, 期号: [db:dc_citation_issue], 页码: 1181-1195
作者:
Huang, Ru-Wei
;
Gui, Xiao-Lin
;
Chen, Ning-Jiang
;
Yao, Jing
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/02
Cloud securities
Data utilization
Encryption algorithms
Encryption schemes
Order preserving
Performance evaluations
Security analysis
Sensitive datas
基于J2EE的证券公司人力资源管理系统的设计与实现
学位论文
2015, 2014
熊智勇
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2016/01/12
人力资源管理
B/S模式
MVC模型
Human Resource Management
B/S pattern
MVC model
Chances and Challenges Confronting Securities Industry and the Countermeasures in Big Data and Cloud Computing Era
会议论文
9th IEEE International Conference on Computer Science and Education (ICCSE), Univ British Columbia, Vancouver, CANADA, 2014-08-22
作者:
Ma, Li
;
Jiang, Mingfeng
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/09
Big data
cloud computing
data mining
securities industry
countermeasures
Privacy-preserving computable encryption scheme of Cloud Computing
期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2011, 卷号: 34, 期号: [db:dc_citation_issue], 页码: 2391-2402
作者:
Huang, Ru-Wei
;
Gui, Xiao-Lin
;
Yu, Si
;
Zhuang, Wei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/10
Cloud securities
Encryption schemes
Matrix calculations
Matrix operations
Performance evaluations
Privacy preserving
Security analysis
String search
10 Cloud Computing Predictions.
期刊论文
Informationweek, 2009, 卷号: No.1219, 页码: 20
作者:
Foley,John
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/13
SUPPLY
&
demand
ELECTRONIC
systems
INFORMATION
technology
SECURITIES
markets
COMPUTER
science
COMPUTER
service
industry
©版权所有 ©2017 CSpace - Powered by
CSpace