-
21
Overview of privacy preserving in social network
Published 2016-04-01Subjects: Get full text
Article -
22
Blockchain data access control scheme based on CP-ABE algorithm
Published 2020-06-01Subjects: Get full text
Article -
23
Risk-adaptive access control model for big data in healthcare
Published 2015-12-01Subjects: “…risk-based access control…”
Get full text
Article -
24
-
25
Mimic defense authentication method for physical access control
Published 2020-06-01Subjects: “…access control…”
Get full text
Article -
26
Implementation of shared file encrypted storage hierarchical access control scheme
Published 2016-07-01Subjects: Get full text
Article -
27
Accelerated algorithm in attribute-based encryption over cloud environment
Published 2019-11-01Subjects: Get full text
Article -
28
Research on the design and application of role-resource based access control model
Published 2024-11-01Subjects: Get full text
Article -
29
Blockchain-based noisy data sharing control protocol
Published 2023-10-01Subjects: Get full text
Article -
30
-
31
Permission clustering-based attribute value optimization
Published 2021-08-01Subjects: Get full text
Article -
32
Private data access control model based on block chain technology in the internet of things environment
Published 2022-12-01Subjects: Get full text
Article -
33
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01Subjects: Get full text
Article -
34
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01Subjects: Get full text
Article -
35
New entity authentication and access control scheme in satellite communication network
Published 2018-06-01Subjects: Get full text
Article -
36
Chinese wall model based on dynamic alliance
Published 2009-01-01Subjects: “…access control…”
Get full text
Article -
37
Research on formal description and verification of automated trust negotiation
Published 2011-01-01Subjects: “…access control…”
Get full text
Article -
38
Traffic Modeling and Access Control for Machine Type Communications:A Comprehensive Survey
Published 2015-08-01Subjects: Get full text
Article -
39
Access control model and its application for collaborative information systems
Published 2008-01-01Subjects: “…access control…”
Get full text
Article -
40
Automatic generation of AppArmor security policies based on large language models
Published 2024-06-01Subjects: “…mandatory access control…”
Get full text
Article