首页 > 最新文献

Queue最新文献

英文 中文
Confidential Computing: Elevating Cloud Security and Privacy 机密计算:提升云安全和隐私
Q3 Computer Science Pub Date : 2023-08-31 DOI: 10.1145/3623461
M. Russinovich
Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, clearly defined security boundary, isolating sensitive data within trusted execution environments during computation. This means services can be designed that segment data based on least-privilege access principles, while all other code in the system sees only encrypted data. Crucially, the isolation is rooted in novel hardware primitives, effectively rendering even the cloud-hosting infrastructure and its administrators incapable of accessing the data. This approach creates more resilient systems capable of withstanding increasingly sophisticated cyber threats, thereby reinforcing data protection and sovereignty in an unprecedented manner.
机密计算(CC)通过大幅减少系统的攻击面,从根本上改善了我们的安全态势。虽然传统系统在静止和传输中对数据进行加密,但CC将这种保护扩展到了使用中的数据。它提供了一个新颖的、明确定义的安全边界,在计算过程中隔离可信执行环境中的敏感数据。这意味着可以设计基于最小权限访问原则对数据进行分段的服务,而系统中的所有其他代码只能看到加密数据。至关重要的是,这种隔离植根于新的硬件原语,有效地使云托管基础设施及其管理员无法访问数据。这种方法创造了更具弹性的系统,能够抵御日益复杂的网络威胁,从而以前所未有的方式加强数据保护和主权。
{"title":"Confidential Computing: Elevating Cloud Security and Privacy","authors":"M. Russinovich","doi":"10.1145/3623461","DOIUrl":"https://doi.org/10.1145/3623461","url":null,"abstract":"Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, clearly defined security boundary, isolating sensitive data within trusted execution environments during computation. This means services can be designed that segment data based on least-privilege access principles, while all other code in the system sees only encrypted data. Crucially, the isolation is rooted in novel hardware primitives, effectively rendering even the cloud-hosting infrastructure and its administrators incapable of accessing the data. This approach creates more resilient systems capable of withstanding increasingly sophisticated cyber threats, thereby reinforcing data protection and sovereignty in an unprecedented manner.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"44 - 48"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44147334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware VM Isolation in the Cloud 云中的硬件虚拟机隔离
Q3 Computer Science Pub Date : 2023-08-31 DOI: 10.1145/3623392
David Kaplan
Confidential computing is a security model that fits well with the public cloud. It enables customers to rent VMs while enjoying hardware-based isolation that ensures that a cloud provider cannot purposefully or accidentally see or corrupt their data. SEV-SNP was the first commercially available x86 technology to offer VM isolation for the cloud and is deployed in Microsoft Azure, AWS, and Google Cloud. As confidential computing technologies such as SEV-SNP develop, confidential computing is likely to simply become the default trust model for the cloud.
机密计算是一种非常适合公共云的安全模型。它使客户能够在租用虚拟机的同时享受基于硬件的隔离,从而确保云提供商不会有意或无意地看到或破坏他们的数据。SEV-SNP是第一个为云提供虚拟机隔离的商用x86技术,部署在Microsoft Azure、AWS和谷歌cloud中。随着SEV-SNP等保密计算技术的发展,保密计算很可能成为云的默认信任模型。
{"title":"Hardware VM Isolation in the Cloud","authors":"David Kaplan","doi":"10.1145/3623392","DOIUrl":"https://doi.org/10.1145/3623392","url":null,"abstract":"Confidential computing is a security model that fits well with the public cloud. It enables customers to rent VMs while enjoying hardware-based isolation that ensures that a cloud provider cannot purposefully or accidentally see or corrupt their data. SEV-SNP was the first commercially available x86 technology to offer VM isolation for the cloud and is deployed in Microsoft Azure, AWS, and Google Cloud. As confidential computing technologies such as SEV-SNP develop, confidential computing is likely to simply become the default trust model for the cloud.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"49 - 67"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45441558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing Hybrid Teams 管理混合型团队
Q3 Computer Science Pub Date : 2023-06-23 DOI: 10.1145/3606015
K. Matsudaira
After three years of working remotely, many companies are asking their people to return to the office. Not everyone is coming back, however. With some people in the office and some still working from home, leaders must get this transition to hybrid work right. Hybrid is the worst of both worlds in some ways. You can easily end up creating two experiences?one for the people in the office and one for the remote workers?which can lead to problems that will compound over time and have long-term damaging effects on your team. For leaders who are navigating a newly hybridized work environment, this column presents the following recommendations to help make sure your team is as functional as possible.
经过三年的远程工作,许多公司要求员工回到办公室。然而,并不是所有人都回来了。由于有些人在办公室,有些人仍在家工作,领导者必须正确过渡到混合工作。在某些方面,混合动力是两个世界中最糟糕的。你可以很容易地创造两种体验?一个给办公室里的人,一个给远程工作者?这可能会导致问题随着时间的推移而加剧,并对您的团队产生长期的破坏性影响。对于在新的混合工作环境中导航的领导者,本专栏提出了以下建议,以帮助确保您的团队尽可能发挥作用。
{"title":"Managing Hybrid Teams","authors":"K. Matsudaira","doi":"10.1145/3606015","DOIUrl":"https://doi.org/10.1145/3606015","url":null,"abstract":"After three years of working remotely, many companies are asking their people to return to the office. Not everyone is coming back, however. With some people in the office and some still working from home, leaders must get this transition to hybrid work right. Hybrid is the worst of both worlds in some ways. You can easily end up creating two experiences?one for the people in the office and one for the remote workers?which can lead to problems that will compound over time and have long-term damaging effects on your team. For leaders who are navigating a newly hybridized work environment, this column presents the following recommendations to help make sure your team is as functional as possible.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"5 - 16"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47214256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pointers in Far Memory 远内存中的指针
Q3 Computer Science Pub Date : 2023-06-23 DOI: 10.1145/3606029
E. Miller, Achilles Benetopoulos, George Neville-Neil, P. Mehra, Daniel Bittman
Effectively exploiting emerging far-memory technology requires consideration of operating on richly connected data outside the context of the parent process. Operating-system technology in development offers help by exposing abstractions such as memory objects and globally invariant pointers that can be traversed by devices and newly instantiated compute. Such ideas will allow applications running on future heterogeneous distributed systems with disaggregated memory nodes to exploit near-memory processing for higher performance and to independently scale their memory and compute resources for lower cost.
有效地利用新兴的远内存技术需要考虑在父进程上下文之外操作丰富连接的数据。开发中的操作系统技术通过暴露诸如内存对象和全局不变指针之类的抽象来提供帮助,这些抽象可以被设备和新实例化的计算遍历。这样的想法将允许运行在未来异构分布式系统上的应用程序使用分解的内存节点来利用近内存处理以获得更高的性能,并以更低的成本独立扩展其内存和计算资源。
{"title":"Pointers in Far Memory","authors":"E. Miller, Achilles Benetopoulos, George Neville-Neil, P. Mehra, Daniel Bittman","doi":"10.1145/3606029","DOIUrl":"https://doi.org/10.1145/3606029","url":null,"abstract":"Effectively exploiting emerging far-memory technology requires consideration of operating on richly connected data outside the context of the parent process. Operating-system technology in development offers help by exposing abstractions such as memory objects and globally invariant pointers that can be traversed by devices and newly instantiated compute. Such ideas will allow applications running on future heterogeneous distributed systems with disaggregated memory nodes to exploit near-memory processing for higher performance and to independently scale their memory and compute resources for lower cost.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"75 - 93"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41812595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Mismatch 安全不匹配
Q3 Computer Science Pub Date : 2023-06-23 DOI: 10.1145/3606028
Phil Vachon
Information security teams that say 'no' need to change. Hiding behind a moat makes repelling attacks easy, but bridges allow you to replenish supplies and foster relationships with customers? castles. Remember, a security team's role is to empower their business to move forward with confidence, not to hinder progress.
说“不”的信息安全团队需要改变。躲在护城河后面可以很容易地击退攻击,但桥梁可以让你补充物资并培养与客户的关系?城堡。请记住,安全团队的作用是让他们的业务充满信心地向前发展,而不是阻碍进展。
{"title":"Security Mismatch","authors":"Phil Vachon","doi":"10.1145/3606028","DOIUrl":"https://doi.org/10.1145/3606028","url":null,"abstract":"Information security teams that say 'no' need to change. Hiding behind a moat makes repelling attacks easy, but bridges allow you to replenish supplies and foster relationships with customers? castles. Remember, a security team's role is to empower their business to move forward with confidence, not to hinder progress.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"23 - 28"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43582884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Flexible is CXL's Memory Protection? CXL的内存保护有多灵活?
Q3 Computer Science Pub Date : 2023-06-23 DOI: 10.1145/3606014
Samuel W. Stark, A. T. Markettos, S. Moore
CXL, a new interconnect standard for cache-coherent memory sharing, is becoming a reality - but its security leaves something to be desired. Decentralized capabilities are flexible and resilient against malicious actors, and should be considered while CXL is under active development.
CXL,一种用于缓存一致内存共享的新互连标准,正在成为现实——但是它的安全性还有待改进。分散的功能对恶意参与者来说是灵活和有弹性的,应该在CXL积极开发的时候考虑。
{"title":"How Flexible is CXL's Memory Protection?","authors":"Samuel W. Stark, A. T. Markettos, S. Moore","doi":"10.1145/3606014","DOIUrl":"https://doi.org/10.1145/3606014","url":null,"abstract":"CXL, a new interconnect standard for cache-coherent memory sharing, is becoming a reality - but its security leaves something to be desired. Decentralized capabilities are flexible and resilient against malicious actors, and should be considered while CXL is under active development.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"54 - 64"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43669712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Echoes of Intelligence 智能的回声
Q3 Computer Science Pub Date : 2023-06-23 DOI: 10.1145/3606011
A. Videla
We are now in the presence of a new medium disguised as good old text, but that text has been generated by an LLM, without authorial intention—an aspect that, if known beforehand, completely changes the expectations and response a human should have from a piece of text. Should our interpretation capabilities be engaged? If yes, under what conditions? The rules of the language game should be spelled out; they should not be passed over in silence.
我们现在面对的是一种伪装成优秀旧文本的新媒体,但这些文本是由法学硕士生成的,没有作者的意图——如果事先知道这一点,就会完全改变人类对一段文本的期望和反应。我们的口译能力应该参与进来吗?如果是,在什么条件下?应该阐明语言游戏的规则;他们不应该被沉默地忽视。
{"title":"Echoes of Intelligence","authors":"A. Videla","doi":"10.1145/3606011","DOIUrl":"https://doi.org/10.1145/3606011","url":null,"abstract":"We are now in the presence of a new medium disguised as good old text, but that text has been generated by an LLM, without authorial intention—an aspect that, if known beforehand, completely changes the expectations and response a human should have from a piece of text. Should our interpretation capabilities be engaged? If yes, under what conditions? The rules of the language game should be spelled out; they should not be passed over in silence.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"36 - 53"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43135366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stone Knives and Bear Skins 石刀和熊皮
Q3 Computer Science Pub Date : 2023-06-23 DOI: 10.1145/3606027
George Neville-Neil
If you look at the software tooling landscape, you see that the majority of developers work with either open-source tools; or tools from the recently reformed home of proprietary software, Microsoft, which has figured out that its Visual Studio Code system is a good way to sucker people into working with its platforms; or finally Apple, whose tools are meant only for its platform. In specialized markets, such as deeply embedded, military, and aerospace, there are proprietary tools that are often far worse than their open-source cousins, because the market for such tools is small but lucrative.
如果你看看软件工具的前景,你会发现大多数开发人员都使用开源工具;或者来自最近改革的专有软件之家微软的工具,微软已经发现其Visual Studio代码系统是吸引人们使用其平台的好方法;最后是苹果,其工具仅适用于其平台。在深度嵌入式、军事和航空航天等专业市场,有些专有工具往往比开源工具差得多,因为这些工具的市场很小,但利润丰厚。
{"title":"Stone Knives and Bear Skins","authors":"George Neville-Neil","doi":"10.1145/3606027","DOIUrl":"https://doi.org/10.1145/3606027","url":null,"abstract":"If you look at the software tooling landscape, you see that the majority of developers work with either open-source tools; or tools from the recently reformed home of proprietary software, Microsoft, which has figured out that its Visual Studio Code system is a good way to sucker people into working with its platforms; or finally Apple, whose tools are meant only for its platform. In specialized markets, such as deeply embedded, military, and aerospace, there are proprietary tools that are often far worse than their open-source cousins, because the market for such tools is small but lucrative.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"29 - 35"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45715731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don't "Think of the Internet!" 不要“想到互联网!”
Q3 Computer Science Pub Date : 2023-06-23 DOI: 10.1145/3606023
Poul-Henning Kamp
I cannot help but notice few women subscribe to absolutist views of electronic privacy and anonymity. Can it be that only people who play life on the easiest setting find unrestricted privacy and anonymity a great idea?
我不禁注意到,很少有女性赞同电子隐私和匿名的绝对主义观点。难道只有那些在最简单的环境中生活的人才会觉得无限制的隐私和匿名是个好主意吗?
{"title":"Don't \"Think of the Internet!\"","authors":"Poul-Henning Kamp","doi":"10.1145/3606023","DOIUrl":"https://doi.org/10.1145/3606023","url":null,"abstract":"I cannot help but notice few women subscribe to absolutist views of electronic privacy and anonymity. Can it be that only people who play life on the easiest setting find unrestricted privacy and anonymity a great idea?","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"17 - 22"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48628405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond the Repository 超越存储库
Q3 Computer Science Pub Date : 2023-04-30 DOI: 10.1145/3595879
Amanda Casari, Julia Ferraioli, Juniper Lovato
Much of the existing research about open source elects to study software repositories instead of ecosystems. An open source repository most often refers to the artifacts recorded in a version control system and occasionally includes interactions around the repository itself. An open source ecosystem refers to a collection of repositories, the community, their interactions, incentives, behavioral norms, and culture. The decentralized nature of open source makes holistic analysis of the ecosystem an arduous task, with communities and identities intersecting in organic and evolving ways. Despite these complexities, the increased scrutiny on software security and supply chains makes it of the utmost importance to take an ecosystem-based approach when performing research about open source. This article provides guidelines and best practices for research using data collected from open source ecosystems, encouraging research teams to work with communities in respectful ways.
许多现有的关于开源的研究选择了研究软件库而不是生态系统。开源存储库通常指的是版本控制系统中记录的工件,偶尔也包括围绕存储库本身的交互。开源生态系统指的是存储库、社区、它们之间的交互、激励、行为规范和文化的集合。开源的分散性使得对生态系统的整体分析成为一项艰巨的任务,社区和身份以有机和不断发展的方式相交。尽管存在这些复杂性,但对软件安全和供应链的日益严格的审查使得在进行关于开源的研究时采用基于生态系统的方法变得至关重要。本文提供了使用从开源生态系统收集的数据进行研究的指导方针和最佳实践,鼓励研究团队以尊重的方式与社区合作。
{"title":"Beyond the Repository","authors":"Amanda Casari, Julia Ferraioli, Juniper Lovato","doi":"10.1145/3595879","DOIUrl":"https://doi.org/10.1145/3595879","url":null,"abstract":"Much of the existing research about open source elects to study software repositories instead of ecosystems. An open source repository most often refers to the artifacts recorded in a version control system and occasionally includes interactions around the repository itself. An open source ecosystem refers to a collection of repositories, the community, their interactions, incentives, behavioral norms, and culture. The decentralized nature of open source makes holistic analysis of the ecosystem an arduous task, with communities and identities intersecting in organic and evolving ways. Despite these complexities, the increased scrutiny on software security and supply chains makes it of the utmost importance to take an ecosystem-based approach when performing research about open source. This article provides guidelines and best practices for research using data collected from open source ecosystems, encouraging research teams to work with communities in respectful ways.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135668049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Queue
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1