Showing 21 - 40 results of 362 for search '"access control"', query time: 0.10s Refine Results
  1. 21

    SDFAC:software defined flow access control mechanism by Xiu-lei WANG, Guo-min ZHANG, Chao HU, Ming CHEN, Xiang-lin WEI

    Published 2015-11-01
    Subjects: “…access control mechanism…”
    Get full text
    Article
  2. 22
  3. 23
  4. 24
  5. 25

    Design of polling access control protocol in WSN based on FPGA by Long-jun LIU, Hong-wei DING, Qian-lin LIU, Zheng-gang LIU

    Published 2016-10-01
    “…MAC(media access control) protocol is a direct link between physical and network layer,which is one of the key protocols to ensure high efficient communication.According to the characteristics of WSN (wireless sensor network) nodes,the design and implementation of polling access control protocol based on FPGA (field programmable gate array) were presented for the first time.The design made full use of the characteristics of flexibility and reconfigurability of FPGA.The method of combination of the hardware circuit description language Verilog HDL and the principle diagram was adopted,using Quartus II 8.0 to carry on the synthesis and routing,testing in the DE2.The design has the characteristics of good real-time,high reliability,strong portability,and can effectively reduce the transmission delay and improve the bus utilization.The designed system can be widely used in WSN,software radio network,ad hoc networks,military integrated service network,mobile communications networks,Internet of things as well as other fields.…”
    Get full text
    Article
  6. 26

    Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG

    Published 2015-12-01
    Subjects: “…risk-based access control…”
    Get full text
    Article
  7. 27
  8. 28
  9. 29
  10. 30

    Extended access control mechanism for cross-domain data exchange by Rongna XIE, Yunchuan GUO, Fenghua LI, Guozhen SHI, Yaqiong WANG, Kui GENG

    Published 2019-07-01
    “…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
    Get full text
    Article
  11. 31
  12. 32

    Access control scheme for medical data based on PBAC and IBE by Yi-ting ZHANG, Yu-chuan FU, Ming YANG, Jun-zhou LUO

    Published 2015-12-01
    “…Due to the large amount of personal privacy information contained,the medical big data formed in the health care industry was faced with potential threats of both external attacks and internal data leakages.However,traditional access control technology didn’t take into account the important role of user access purpose in the access control schemes that emphasized data privacy,and existing symmetric and asymmetric encryption technologies both face problems such as the complexity of key and certificate management.To address these problems,a novel access control scheme based on PBAC model and IBE encryption technology was proposed,which could provide flexible access control of encrypted medical data.By introducing the concept of conditioned purpose,the PBAC model was extended to achieve full coverage of purpose trees.Furthermore,the scheme used patient ID,conditioned bit and intended purpose as the IBE public key,with which patients’ data were encrypted.Only users who pass the authentication and whose access purposes conform to the intended purposes can obtain the corresponding private keys and the encrypted data,thereby achieving access to patients’ information.Experimental results prove that the scheme can achieve the goals of fine-grained access control and privacy protection with high performance.…”
    Get full text
    Article
  13. 33
  14. 34
  15. 35
  16. 36

    Embedding Trust in the Media Access Control Protocol for Wireless Networks by Chaminda Alocious, Hannan Xiao, Bruce Christianson, Joseph Spring

    Published 2025-01-01
    “…IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. …”
    Get full text
    Article
  17. 37

    Research on extended access control mechanism in online social network by Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI

    Published 2021-10-01
    “…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
    Get full text
    Article
  18. 38
  19. 39
  20. 40