-
41
New entity authentication and access control scheme in satellite communication network
Published 2018-06-01Subjects: Get full text
Article -
42
Context-aware learning-based access control method for power IoT
Published 2021-03-01“…In view of the problems of severe access conflicts, high queue backlog, and low energy efficiency in the massive terminal access scenario of the power Internet of things (power IoT) in 6G era, a context-aware learning-based access control (CLAC) algorithm was proposed.The proposed algorithm was based on reinforcement learning and fast uplink grant technology, considering active state and dormant state of terminals, and the optimization objective was to maximize the total network energy efficiency under the long-term constraint of terminal access service quality requirements.Lyapunov optimization was used to decouple the long-term optimization objective and constraint, and the long-term optimization problem was transformed into a series of single time-slot independent deterministic sub-problems, which could be solved by the terminal state-aware upper confidence bound algorithm.The simulation results show that CLAC can improve the network energy efficiency while meeting the terminal access service quality requirements.Compared with the traditional fast uplink grant, CLAC can improve the average energy efficiency by 48.11%, increase the proportion of terminals meeting access service quality requirements by 54.95%, and reduce the average queue backlog by 83.83%.…”
Get full text
Article -
43
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality
Published 2023-01-01Get full text
Article -
44
Implementation of shared file encrypted storage hierarchical access control scheme
Published 2016-07-01Subjects: Get full text
Article -
45
Research progress of access control model and policy in online social networks
Published 2016-08-01Subjects: Get full text
Article -
46
Privacy risk adaptive access control model via evolutionary game
Published 2019-12-01Subjects: “…risk-adaptive based access control…”
Get full text
Article -
47
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Subjects: Get full text
Article -
48
Research on the design and application of role-resource based access control model
Published 2024-11-01Subjects: Get full text
Article -
49
Access Control Points: Reducing a Possible Blast Impact by Meandering
Published 2018-01-01“…In response to the heightened terror threat in recent years, there is an increasing interest in the introduction of access control zones at sites that are characterized by an increased likelihood of being the target of a terrorist attack, as latest data reveal that unprotected areas of mass congregation of people have become attractive to terrorist groups. …”
Get full text
Article -
50
Blockchain data access control scheme based on CP-ABE algorithm
Published 2020-06-01Subjects: Get full text
Article -
51
Corrigendum to Research on electronic medical record access control based on blockchain
Published 2020-05-01Get full text
Article -
52
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Subjects: Get full text
Article -
53
ABAC access control policy generation technique based on deep learning
Published 2020-12-01Subjects: “…access control…”
Get full text
Article -
54
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01“…Abstract Authentication and access control for Cyber-Physical Systems (CPSs) are pivotal for protecting systems and their users from problems related to harmful actions and the malicious use of retrieved data. …”
Get full text
Article -
55
Security architecture to support multiple security policies based on access control space
Published 2006-01-01“…In order to solve the problems of policy reusability and policy co-existence in LSM,a new security architecture ELSM is proposed.It introduced Model Combiner as main module to implement module stack management and module decision management.Module decision is based on access control space as policy specification for general support.The design of ELSM and the analysis of its implementation in Ansheng OS prove its effectiveness.…”
Get full text
Article -
56
Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy
Published 2020-09-01Subjects: “…cross-domain access control…”
Get full text
Article -
57
Access control model for multi-source heterogeneous data in big data environment
Published 2019-02-01Subjects: Get full text
Article -
58
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01Subjects: Get full text
Article -
59
Traffic Modeling and Access Control for Machine Type Communications:A Comprehensive Survey
Published 2015-08-01Subjects: Get full text
Article -
60
A hierarchical access control scheme based on Lagrange interpolation for mobile agents
Published 2018-07-01Get full text
Article