咨询与建议

限定检索结果

文献类型

  • 19 篇 期刊文献
  • 14 篇 会议

馆藏范围

  • 33 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 20 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 7 篇 软件工程
    • 4 篇 控制科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物工程
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 33 篇 access control m...
  • 6 篇 access control
  • 3 篇 anonymization
  • 3 篇 security policy
  • 3 篇 authorisation
  • 2 篇 role-based acces...
  • 2 篇 linux operating ...
  • 2 篇 elliptic curve c...
  • 2 篇 generalization
  • 2 篇 cyber physical s...
  • 2 篇 secret sharing s...
  • 2 篇 authentication
  • 2 篇 flow graph
  • 2 篇 finite state mac...
  • 2 篇 automation contr...
  • 2 篇 capabilities
  • 2 篇 privacy-preserva...
  • 2 篇 security
  • 2 篇 network security
  • 2 篇 change managemen...

机构

  • 2 篇 department of co...
  • 2 篇 department of co...
  • 1 篇 govt coll engn a...
  • 1 篇 indian inst info...
  • 1 篇 faculty of elect...
  • 1 篇 ks rangasamy col...
  • 1 篇 gokul inst techn...
  • 1 篇 univ chinese aca...
  • 1 篇 delhi technol un...
  • 1 篇 faculty of scien...
  • 1 篇 tunghai univ dep...
  • 1 篇 univ missouri de...
  • 1 篇 wenzhou kean uni...
  • 1 篇 concordia univ d...
  • 1 篇 sogang univ dept...
  • 1 篇 hungkuang univ d...
  • 1 篇 southwest jiaoto...
  • 1 篇 delhi technol un...
  • 1 篇 govt coll engn c...
  • 1 篇 eindhoven univ t...

作者

  • 2 篇 wang hong depart...
  • 2 篇 mante r. v.
  • 1 篇 aishwarya.d
  • 1 篇 mini g. venifa
  • 1 篇 singh ashutosh k...
  • 1 篇 ahmed h i lakadk...
  • 1 篇 nicol david m.
  • 1 篇 verma om prakash
  • 1 篇 shang y
  • 1 篇 wang xiao
  • 1 篇 jain nitin
  • 1 篇 byun changwoo
  • 1 篇 p. dhavachelvan
  • 1 篇 dhavachelvan.p
  • 1 篇 yanbing liu
  • 1 篇 madhuvanthi t.
  • 1 篇 subramaniam balu
  • 1 篇 lichao wang
  • 1 篇 depeng li
  • 1 篇 park j. s.

语言

  • 33 篇 英文
检索条件"主题词=Access Control Mechanism"
33 条 记 录,以下是1-10 订阅
排序:
Design and analysis of an optimal ECC algorithm with effective access control mechanism for big data
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2020年 第15-16期79卷 9757-9783页
作者: Verma, Om Prakash Jain, Nitin Pal, Saibal Kumar Delhi Technol Univ Dept ECE Delhi India Delhi Technol Univ Dept Informat Technol Delhi India DRDO Directorate Informat Technol & Cyber Secur New Delhi India
Big data is a high volume data, as it comprises complex and large volume of information. A successful solution is to redistribute the data to a cloud server that has the capacity of storing and processing big data in ... 详细信息
来源: 评论
LAA-D: Lightweight Authentication and access control mechanism with Dual-Data Storage in Cloud-Internet of Things System Using Blockchain
收藏 引用
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING 2024年 第4期48卷 1483-1499页
作者: Singh, Inderpal Singh, Balraj Lovely Profess Univ Sch Comp Sci & Engn Phagwara Punjab India
Internet of Things (IoT) applications are popularly involved in day-to-day life. The increase in utilization leads to an increase in network traffic. The incoming users have different intentions in the network and hen... 详细信息
来源: 评论
SS-AXI: Secure and Safe access control mechanism for Multi-Tenant Cloud FPGAs  56
SS-AXI: Secure and Safe Access Control Mechanism for Multi-T...
收藏 引用
56th IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Karabulut, Emre Awad, Amro Aysu, Aydin North Carolina State Univ Dept Elect & Comp Engn Raleigh NC 27695 USA
FPGAs are newly added to the cloud to offer energyefficient acceleration. Multi-tenancy is an emerging phenomenon in cloud FPGAs to enable resource efficiency. In a multi-tenant scenario, multiple users can share the ... 详细信息
来源: 评论
Dynamic load balancing assisted optimized access control mechanism for Edge-Fog-Cloud network in Internet of Things environment
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2021年 第21期33卷
作者: Agrawal, Neha Indian Inst Informat Technol Sri City Comp Sci & Engn Grp Chittoor 517646 Andhra Pradesh India
The modern age networks are supposed to be connected, agile, programmable, and load efficient to counter the side-effects of an imbalanced network such as network congestion, higher transmission cost, low reliability,... 详细信息
来源: 评论
Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment
收藏 引用
SERVICE ORIENTED COMPUTING AND APPLICATIONS 2021年 第3期15卷 187-203页
作者: Benifa, J. V. Bibal Mini, G. Venifa Indian Inst Informat Technol Kottayam Kerala India Noorul Islam Ctr Higher Educ Kumaracoil Tamil Nadu India
Cloud computing is a popular model for offering infinite storage resources for the users. In the present scenario, extremely sensitive data is stored in the third-party cloud service provider's infrastructure. For... 详细信息
来源: 评论
Finite State Machine based access control mechanism for Web Service Work Flow Management
收藏 引用
IERI Procedia 2013年 4卷 391-397页
作者: M. Thirumaran P. Dhavachelvan D. Aishwarya R. Shanmugapriya Department of Computer science and Engineering Pondicherry Engg College India Department of Computer science and Engineering Pondicherry University India
Enterprises implement their business process as web services in order to meet the market demand. Typically composite business process requires collection of services under composition along with real time access contr... 详细信息
来源: 评论
Finite State Machine based access control mechanism for Web Service Work Flow Management
Finite State Machine based Access Control Mechanism for Web ...
收藏 引用
2013 International Conference on Electronic Engineering and Computer Science(EECS 2013)
作者: Thirumaran.M Dhavachelvan.P Aishwarya.D R.Shanmugapriya Department of Computer science and Engineering Pondicherry Engg College Department of Computer science and Engineering Pondicherry University
Enterprises implement their business process as web services in order to meet the market *** composite business process requires collection of services under composition along with real time access control to provide ... 详细信息
来源: 评论
A CONGESTION-AWARE access control mechanism IN WIRELESS NETWORKS
A CONGESTION-AWARE ACCESS CONTROL MECHANISM IN WIRELESS NETW...
收藏 引用
2010 3rd IEEE International Conference on Broadband Network & Multimedia Technology(2010年第三届IEEE宽带网络与多媒体国际会议 IC-BNMT 2010)
作者: Haiyan Zheng Yanbing Liu Jin Zhao Key Laboratory of Mobile Internet Technology Chongqing University of Posts and Telecommunications C Key Laboratory of Mobile Internet Technology Chongqing University of Posts and Telecommunications
In standard access control mechanism, contention window is designed according to the number of collision, and ignoring the current congestion information in the network. Consequently, terminal cannot adjust the conten... 详细信息
来源: 评论
Language-based access control approach for component-based software applications
收藏 引用
IET SOFTWARE 2007年 第5期1卷 206-216页
作者: Su, R. Lukkien, J. J. Chaudron, M. R. V. Eindhoven Univ Technol Dept Math & Comp Sci Syst Architecture & Networking Grp NL-5600 MB Eindhoven Netherlands
Security in component-based software applications is studied by looking at information leakage from one component to another through operation calls. Components and security specifications about confidentiality as reg... 详细信息
来源: 评论
Trusted P2P computing environments with role-based access control
收藏 引用
IET INFORMATION SECURITY 2007年 第1期1卷 27-35页
作者: Park, J. S. An, G. Chandra, D. Syracuse Univ LAIST Syracuse NY 13244 USA
A P2P computing environment can be an ideal platform for resource-sharing services in an organisation if it provides trust mechanisms. Current P2P technologies offer content-sharing services for non-sensitive public d... 详细信息
来源: 评论