-
61
Medium access control of multimedia CDMA systems with effective spectral bandwidth distribution
Published 2006-01-01Subjects: Get full text
Article -
62
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability. …”
Get full text
Article -
63
Multi-authority attribute-based access control system in mHealth with traceability
Published 2018-06-01“…Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to enhance fine-grained access control over encrypted data.However,existing attribute-based mHealth systems either lack of efficient traceable approach,or support only single authority.A traceable multi-authority attribute-based access control mHealth scheme was proposed,which was constructed over composite order groups and supports any monotonic access structures described by linear secret sharing scheme (LSSS).The adaptive security was proved under subgroup decisional assumptions.The traceability was proved under k-strong Diffie-Hellman (k-SDH) assumption.The performance analysis indicates that the proposed scheme is efficient and available.…”
Get full text
Article -
64
Secure opportunistic access control in D2D-enabled cellular network
Published 2018-01-01Get full text
Article -
65
Hybrid access control algorithm based on relay node assistant in Femtocell network
Published 2017-01-01Subjects: Get full text
Article -
66
Access control oriented quantified trust degree representation model for distributed systems
Published 2010-01-01Subjects: “…access control…”
Get full text
Article -
67
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01Subjects: Get full text
Article -
68
Access control relationship prediction method based on GNN dual source learning
Published 2022-10-01Subjects: “…relationship-based access control…”
Get full text
Article -
69
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
70
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
71
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01Subjects: “…access control…”
Get full text
Article -
72
A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
Published 2025-01-01Subjects: “…Access control (AC)…”
Get full text
Article -
73
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: Get full text
Article -
74
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Subjects: “…WLAN access control…”
Get full text
Article -
75
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01Subjects: Get full text
Article -
76
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01Subjects: Get full text
Article -
77
Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain
Published 2025-01-01Get full text
Article -
78
Task-based access control mode of peer-to-peer network based on fuzzy theory
Published 2017-02-01“…The opening and self-organization features of P2P network brings a series of security risks,andthe traditional access control model is not suitable for P2P network as it is a kind of distributed management system.Task-based access control mode of P2P network was proposed based on fuzzy theory.And the formalization description and analysis of the model was also proposed.The risk value of each transaction was calculated through hierarchy process analysis and fuzzy comprehensive evaluation.In this model,according to the risk value of each transaction,the dynamic management of ac-cess authority was realized by extending task-basedaccess control model.The results show that this model can restrain the success of noncooperative nodes transaction and raise the success of the whole P2P network system transaction,thus improving the security of P2P network system.…”
Get full text
Article -
79
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01Subjects: Get full text
Article -
80
Eksplorasi ABAC dan XACML untuk Design Access Control pada Resource Digital
Published 2019-10-01“…Akses kontrol lebih fleksibel dibanding dengan pendekatan otorisasi, autentikasi ataupun verifikasi yang sangat sederhana. Mekanisme access control policy dengan pendekatan atribut diyakini sebagai solusi adaptif yaitu ABAC (Attribute Based Access Control) dengan implementasi model XACML (Extensible Access Control Modelling Language). …”
Get full text
Article