-
21
SDFAC:software defined flow access control mechanism
Published 2015-11-01Subjects: “…access control mechanism…”
Get full text
Article -
22
Application of integration methods between university information systems and access control systems
Published 2024-11-01Subjects: “…campus access control system…”
Get full text
Article -
23
Achieving efficient dynamic cryptographic access control in cloud storage
Published 2011-01-01Subjects: Get full text
Article -
24
Hadoop cloud platform user dynamic access control model
Published 2017-09-01Subjects: Get full text
Article -
25
Design of polling access control protocol in WSN based on FPGA
Published 2016-10-01“…MAC(media access control) protocol is a direct link between physical and network layer,which is one of the key protocols to ensure high efficient communication.According to the characteristics of WSN (wireless sensor network) nodes,the design and implementation of polling access control protocol based on FPGA (field programmable gate array) were presented for the first time.The design made full use of the characteristics of flexibility and reconfigurability of FPGA.The method of combination of the hardware circuit description language Verilog HDL and the principle diagram was adopted,using Quartus II 8.0 to carry on the synthesis and routing,testing in the DE2.The design has the characteristics of good real-time,high reliability,strong portability,and can effectively reduce the transmission delay and improve the bus utilization.The designed system can be widely used in WSN,software radio network,ad hoc networks,military integrated service network,mobile communications networks,Internet of things as well as other fields.…”
Get full text
Article -
26
Risk-adaptive access control model for big data in healthcare
Published 2015-12-01Subjects: “…risk-based access control…”
Get full text
Article -
27
Community field-centric trust-based access control model
Published 2013-09-01Subjects: Get full text
Article -
28
Cross-network access control mechanism for complex network environment
Published 2018-02-01Subjects: Get full text
Article -
29
Access control model and its application for collaborative information systems
Published 2008-01-01Subjects: “…access control…”
Get full text
Article -
30
Extended access control mechanism for cross-domain data exchange
Published 2019-07-01“…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
Get full text
Article -
31
Security mechanism in access control based on non-cooperative game
Published 2014-11-01Subjects: “…access control…”
Get full text
Article -
32
Access control scheme for medical data based on PBAC and IBE
Published 2015-12-01“…Due to the large amount of personal privacy information contained,the medical big data formed in the health care industry was faced with potential threats of both external attacks and internal data leakages.However,traditional access control technology didn’t take into account the important role of user access purpose in the access control schemes that emphasized data privacy,and existing symmetric and asymmetric encryption technologies both face problems such as the complexity of key and certificate management.To address these problems,a novel access control scheme based on PBAC model and IBE encryption technology was proposed,which could provide flexible access control of encrypted medical data.By introducing the concept of conditioned purpose,the PBAC model was extended to achieve full coverage of purpose trees.Furthermore,the scheme used patient ID,conditioned bit and intended purpose as the IBE public key,with which patients’ data were encrypted.Only users who pass the authentication and whose access purposes conform to the intended purposes can obtain the corresponding private keys and the encrypted data,thereby achieving access to patients’ information.Experimental results prove that the scheme can achieve the goals of fine-grained access control and privacy protection with high performance.…”
Get full text
Article -
33
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01Subjects: Get full text
Article -
34
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: Get full text
Article -
35
Enhanced cloud storage access control scheme based on attribute
Published 2013-08-01Subjects: Get full text
Article -
36
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01“…IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. …”
Get full text
Article -
37
Research on extended access control mechanism in online social network
Published 2021-10-01“…Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the number of user relationship hops and resource forwarding hops, so as to achieve fine-grained extended access control to the data.The generation algorithm and distribution method of privacy labels were proposed.The constraint rules of privacy label were designed and the possible policy conflicts were analyzed.Finally, the test proves that the mechanism achieves fine-grained extended control in social networks, and proves its security and validity of the mechanism.…”
Get full text
Article -
38
Multi-user collaborative access control scheme in cloud storage
Published 2016-01-01Subjects: Get full text
Article -
39
CP-ABE based data access control for cloud storage
Published 2011-01-01Subjects: Get full text
Article -
40
An access control scheme for IoT based on smart contracts and CP-ABE
Published 2024-10-01Subjects: Get full text
Article