咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献
  • 20 篇 会议

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 33 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 6 篇 软件工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 43 篇 distributed acce...
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 4 篇 access control
  • 4 篇 privacy
  • 3 篇 computer securit...
  • 3 篇 security
  • 3 篇 authorization
  • 2 篇 grid computing
  • 2 篇 operational sema...
  • 2 篇 wireless sensor ...
  • 2 篇 attribute-based ...
  • 2 篇 identity provide...
  • 2 篇 security managem...
  • 2 篇 identity managem...
  • 2 篇 rewriting
  • 2 篇 security policie...
  • 2 篇 trust management
  • 2 篇 edge computing
  • 2 篇 trust

机构

  • 2 篇 carnegie mellon ...
  • 2 篇 univ waterloo da...
  • 2 篇 purdue univ sch ...
  • 2 篇 carnegie mellon ...
  • 2 篇 natl inst techno...
  • 1 篇 new mexico state...
  • 1 篇 school of comput...
  • 1 篇 chinese acad sci...
  • 1 篇 zhejiang univ co...
  • 1 篇 univ colombo sch...
  • 1 篇 informatics labo...
  • 1 篇 beihang univ sch...
  • 1 篇 school of electr...
  • 1 篇 lif umr cnrs & a...
  • 1 篇 univ saskatchewa...
  • 1 篇 bangalore univ c...
  • 1 篇 school of comput...
  • 1 篇 natl agcy promot...
  • 1 篇 department of co...
  • 1 篇 univ appl sci we...

作者

  • 2 篇 bertolissi clara
  • 2 篇 hengartner urs
  • 2 篇 sekaran k. chand...
  • 2 篇 steenkiste peter
  • 2 篇 ghafoor arif
  • 2 篇 thomas manoj v.
  • 2 篇 zickau sebastian
  • 2 篇 fernandez maribe...
  • 1 篇 thatmann dirk
  • 1 篇 khair marie
  • 1 篇 rossi matteo
  • 1 篇 zhang jiahong
  • 1 篇 li dawei
  • 1 篇 luo yuan
  • 1 篇 manoj v. thomas
  • 1 篇 pangalos george
  • 1 篇 sadeghi mersedeh
  • 1 篇 tang bo
  • 1 篇 van der haar dus...
  • 1 篇 reeder robert w.

语言

  • 38 篇 英文
  • 3 篇 中文
  • 1 篇 德文
  • 1 篇 其他
检索条件"主题词=Distributed Access Control"
43 条 记 录,以下是1-10 订阅
排序:
AADEC: Anonymous and Auditable distributed access control for Edge Computing Services
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2023年 18卷 290-303页
作者: Zhou, Xiaotong He, Debiao Ning, Jianting Luo, Min Huang, Xinyi Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin 541004 Peoples R China Shanghai Key Lab Privacy Preserving Computat Matrix Elements Technol Shanghai 201204 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Qilu Univ Technol Shandong Acad Sci Shandong Prov Key Lab Comp Networks Jinan 250014 Peoples R China Hong Kong Univ Sci & Technol Guangzhou Artificial Intelligence Thrust Informat Hub Guangzhou 511455 Peoples R China
Edge computing is an emerging distributed computing concept that allows edge servers to provide authorized consumers with various on-demand services. Due to highly dynamic and untrustworthy network environments, vario... 详细信息
来源: 评论
APECS: A distributed access control Framework for Pervasive Edge Computing Services  21
APECS: A Distributed Access Control Framework for Pervasive ...
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Dougherty, Sean Tourani, Reza Panwar, Gaurav Vishwanathan, Roopa Misra, Satyajayant Srikanteswara, Srikathyayani St Louis Univ St Louis MO 63103 USA New Mexico State Univ Las Cruces NM 88003 USA Intel Labs Portland OR USA
Edge Computing is a new computing paradigm where applications operate at the network edge, providing low-latency services with augmented user and data privacy. A desirable goal for edge computing is pervasiveness, tha... 详细信息
来源: 评论
MA-MOrBAC: A distributed access control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems  12th
MA-MOrBAC: A Distributed Access Control Model Based on Mobil...
收藏 引用
12th International Conference on Risks and Security of Internet and Systems (CRISIS)
作者: Ben Yahya, Zeineb Ktata, Farah Barika Ghedira, Khaled Univ Manouba COSMOS Natl Sch Comp Sci Tunisia ENSI Manouba Tunisia Univ Sousse COSMOS Higher Inst Appl Sci & Technol Sousse ISSATSO Sousse Tunisia Natl Agcy Promot Sci Res Tunisia COSMOS Tunis Tunisia
Facing the current evolution of networks infrastructure and the expansion of the information system in organizations and businesses, protecting data and resources against unauthorized access and unauthorized disclosur... 详细信息
来源: 评论
distributed access control with adaptive privacy preserving property for wireless sensor networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2014年 第4期7卷 759-773页
作者: Ma, Changsha Xue, Kaiping Hong, Peilin Univ Sci & Technol China EEIS Dept Informat Network Lab Hefei 230027 Peoples R China
access control plays an important role in protecting security-sensitive sensor data from being utilized by malicious users. Despite the numerous studies on access control for wireless sensor networks (WSNs), however, ... 详细信息
来源: 评论
distributed attribute-based access control system using permissioned blockchain
收藏 引用
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS 2021年 第5期24卷 1617-1644页
作者: Rouhani, Sara Belchior, Rafael Cruz, Rui S. Deters, Ralph Univ Saskatchewan Dept Comp Sci Saskatoon SK S7N 5C9 Canada Univ Lisbon Inst Super Tecn Dept Comp Sci & Engn Lisbon Portugal
Auditing provides essential security control in computer systems by keeping track of all access attempts, including both legitimate and illegal access attempts. This phase can be useful in the context of audits, where... 详细信息
来源: 评论
A semantic-based access control mechanism for distributed systems  21
A semantic-based access control mechanism for distributed sy...
收藏 引用
36th Annual ACM Symposium on Applied Computing (SAC)
作者: Sadeghi, Mersedeh Sartor, Luca Rossi, Matteo Politecn Milan Dipartimento Elett Informaz & Bioingn Milan Italy Politecn Milan Dipartimento Meccan Milan Italy
access control management in a collaborative environment composed of a multitude of distributed autonomous organizations is a challenging task. To answer the challenge, in this paper we propose a novel approach that i... 详细信息
来源: 评论
Workflow Model for distributed access control
Workflow Model for Distributed Access Control
收藏 引用
3rd International Conference on Advances in Computing and Communications (ICACC)
作者: Thomas, Manoj V. Sekaran, K. Chandra Natl Inst Technol Dept Comp Sci & Engn Surathkal 575025 Karnataka India
In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authent... 详细信息
来源: 评论
A distributed access control Architecture for Cloud Computing
收藏 引用
IEEE SOFTWARE 2012年 第2期29卷 36-44页
作者: Almutairi, Abdulrahman A. Sarfraz, Muhammad I. Basalamah, Saleh Aref, Walid G. Ghafoor, Arif Purdue Univ Sch Elect & Comp Engn W Lafayette IN 47907 USA Umm Al Qura Univ Mecca Saudi Arabia
The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud\'s main challenge is to provide a robust authorization mechanism that incorporates multitenan... 详细信息
来源: 评论
Agent-Based Approach for distributed access control in Cloud Environments
Agent-Based Approach for Distributed Access Control in Cloud...
收藏 引用
International Conference on Advances in Computing, Communications and Informatics
作者: Manoj V. Thomas K. Chandra Sekaran Department of Computer Science and Engineering National Institute of Technology
Recently, considerable attention has been given to the emerging cloud computing paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service provid... 详细信息
来源: 评论
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained access control in Fog Computing
收藏 引用
IEEE access 2019年 7卷 11688-11697页
作者: Li, Dawei Liu, Jianwei Wu, Qianhong Guan, Zhenyu Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Beihang Univ Sch Cyber Sci & Technol Beijing 100191 Peoples R China
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network. When protecting... 详细信息
来源: 评论