-
81
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
Published 2021-03-01Subjects: “…access control…”
Get full text
Article -
82
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
Published 2014-02-01Get full text
Article -
83
Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method
Published 2014-01-01“…A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. …”
Get full text
Article -
84
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a ciphertext policy hidden access control scheme based on blockchain and supporting data sharing is proposed. …”
Get full text
Article -
85
Fine-grained access control scheme with user privacy protection in cloud storage systems
Published 2014-11-01Get full text
Article -
86
Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments
Published 2020-05-01“…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
Get full text
Article -
87
Conditioned secure access control model based on multi-weighted roles and rules in workflow system
Published 2008-01-01Subjects: Get full text
Article -
88
Optimization design and application of library face recognition access control system based on improved PCA.
Published 2025-01-01“…The application of face recognition technology in Library Access Control System (LACS) has an important impact on improving the security and management efficiency of the library. …”
Get full text
Article -
89
Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication
Published 2021-04-01“…An adaptive parameter optimization polling-based medium access control protocol is proposed to optimize network performance. …”
Get full text
Article -
90
-
91
Optimization design and application of library face recognition access control system based on improved PCA
Published 2025-01-01Get full text
Article -
92
Private data access control model based on block chain technology in the internet of things environment
Published 2022-12-01Subjects: Get full text
Article -
93
On the fly biometric identification system using hand‐geometry
Published 2021-05-01Subjects: “…biometrics (access control)…”
Get full text
Article -
94
An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
Published 2014-11-01“…In this paper, we design an attribute-based encryption scheme for fine-grained access control in WBANs. In our scheme, a user can decrypt a ciphertext if the attributes related with a ciphertext satisfy the user's access structure. …”
Get full text
Article -
95
Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media
Published 2014-04-01Subjects: Get full text
Article -
96
-
97
Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
Published 2025-01-01Subjects: “…Access control…”
Get full text
Article -
98
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Published 2014-01-01“…We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. …”
Get full text
Article -
99
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01“…This proposed scheme allows only the non-revoked users to access the system resources, thus, providing restricted access control. Here, the ERS generates a secret time key for signature generation based on a revoked user list. …”
Get full text
Article -
100
Ultra-low-power media access control protocol based on clock drift characteristics in wireless sensor networks
Published 2017-07-01“…Using the characteristics, a new media access control protocol, WideMAC, was designed to support a wide range of duty cycles for various applications. …”
Get full text
Article