咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献
  • 20 篇 会议

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 33 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 6 篇 软件工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 4 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 43 篇 distributed acce...
  • 6 篇 authentication
  • 6 篇 cloud computing
  • 4 篇 access control
  • 4 篇 privacy
  • 3 篇 computer securit...
  • 3 篇 security
  • 3 篇 authorization
  • 2 篇 grid computing
  • 2 篇 operational sema...
  • 2 篇 wireless sensor ...
  • 2 篇 attribute-based ...
  • 2 篇 identity provide...
  • 2 篇 security managem...
  • 2 篇 identity managem...
  • 2 篇 rewriting
  • 2 篇 security policie...
  • 2 篇 trust management
  • 2 篇 edge computing
  • 2 篇 trust

机构

  • 2 篇 carnegie mellon ...
  • 2 篇 univ waterloo da...
  • 2 篇 purdue univ sch ...
  • 2 篇 carnegie mellon ...
  • 2 篇 natl inst techno...
  • 1 篇 new mexico state...
  • 1 篇 school of comput...
  • 1 篇 chinese acad sci...
  • 1 篇 zhejiang univ co...
  • 1 篇 univ colombo sch...
  • 1 篇 informatics labo...
  • 1 篇 beihang univ sch...
  • 1 篇 school of electr...
  • 1 篇 lif umr cnrs & a...
  • 1 篇 univ saskatchewa...
  • 1 篇 bangalore univ c...
  • 1 篇 school of comput...
  • 1 篇 natl agcy promot...
  • 1 篇 department of co...
  • 1 篇 univ appl sci we...

作者

  • 2 篇 bertolissi clara
  • 2 篇 hengartner urs
  • 2 篇 sekaran k. chand...
  • 2 篇 steenkiste peter
  • 2 篇 ghafoor arif
  • 2 篇 thomas manoj v.
  • 2 篇 zickau sebastian
  • 2 篇 fernandez maribe...
  • 1 篇 thatmann dirk
  • 1 篇 khair marie
  • 1 篇 rossi matteo
  • 1 篇 zhang jiahong
  • 1 篇 li dawei
  • 1 篇 luo yuan
  • 1 篇 manoj v. thomas
  • 1 篇 pangalos george
  • 1 篇 sadeghi mersedeh
  • 1 篇 tang bo
  • 1 篇 van der haar dus...
  • 1 篇 reeder robert w.

语言

  • 38 篇 英文
  • 3 篇 中文
  • 1 篇 德文
  • 1 篇 其他
检索条件"主题词=distributed access control"
43 条 记 录,以下是11-20 订阅
排序:
distributed access control with Privacy Support in Wireless Sensor Networks
收藏 引用
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2011年 第10期10卷 3472-3481页
作者: He, Daojing Bu, Jiajun Zhu, Sencun Chan, Sammy Chen, Chun Zhejiang Univ Coll Comp Sci Hangzhou Zhejiang Peoples R China Penn State Univ Dept Comp Sci & Engn Coll Informat Sci & Technol University Pk PA 16802 USA City Univ Hong Kong Dept Elect Engn Hong Kong Hong Kong Peoples R China
A distributed access control module in wireless sensor networks (WSNs) allows the network to authorize and grant user access privileges for in-network data access. Prior research mainly focuses on designing such acces... 详细信息
来源: 评论
Decentralized Opportunistic access for D2D Underlaid Cellular Networks
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2018年 第10期66卷 4842-4853页
作者: Chen, Zheng Kountouris, Marios Linkoping Univ Dept Elect Engn ISY S-58183 Linkoping Sweden Huawei Technol Co Ltd Math & Algorithm Sci Lab Paris Res Ctr F-92100 Boulogne France
In this paper, we propose a decentralized access control scheme for interference management in device-to-device (D2D) underlaid cellular networks. Our method combines signal-to-interference ratio (SIR)-aware link acti... 详细信息
来源: 评论
Lightweight distributed secure data management system for health internet of things
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2017年 89卷 26-37页
作者: Yang, Yang Zheng, Xianghan Tang, Chunming Fuzhou Univ Coll Math & Comp Sci Fuzhou Peoples R China Guangzhou Univ Sch Math & Informat Sci Key Lab Informat Secur Guangzhou 510006 Guangdong Peoples R China
Internet of Things (IoT) connects various kinds of sensors and smart devices using the internet to collect data. The adoption of IoT in medical care field will bring great convenient to both doctors and patients for e... 详细信息
来源: 评论
A metamodel of access control for distributed environments: Applications and properties
收藏 引用
INFORMATION AND COMPUTATION 2014年 238卷 187-207页
作者: Bertolissi, Clara Fernandez, Maribel LIF UMR CNRS & AMU 7279 Marseille France Kings Coll London Dept Informat London WC2R 2LS England
We describe a metamodel for access control, designed to take into account the specific requirements of distributed environments. We see a distributed system consisting of several sites, each with its own resources to ... 详细信息
来源: 评论
A new construction of threshold cryptosystems based on RSA
收藏 引用
INFORMATION SCIENCES 2016年 363卷 140-153页
作者: Zhang, Chenchen Luo, Yuan Xue, Guangtao Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai Peoples R China
There have been many ways to construct a threshold cryptosystem. Most often they are constructed by combining original public encryption schemes with some methods such as Shamir's secret sharing. In this paper a n... 详细信息
来源: 评论
Construction of High Dependable distributed access control Architecture Based on Quorum System
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第3期15卷 210-216页
作者: XIONG Tinggang LU Zhengding ZHANG Jiahong MA Zhong School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 Hubei China Wuhan Digital and Engineering Institute Wuhan 430074 Hubei China
Quorum system is a preferable model to construct distributed access control architecture, but not all quorum system can satisfy the requirements of distributed access control architecture. Aiming at the dependable pro... 详细信息
来源: 评论
TikiriAC: Node-Level Equally distributed access control for Shared Sensor Networks
TikiriAC: Node-Level Equally Distributed Access Control for ...
收藏 引用
4th International Workshop on Real-World Wireless Sensor Networks
作者: Laxaman, Nayanajith M. Goonatillake, M. D. J. S. De Zoysa, Kasun Univ Colombo Sch Comp Colombo 7 Sri Lanka
In this paper, we propose an access control mechanism that can be used to overcome challenges and problems related to access controlling in a shared Wireless Sensor Network (WSN) databases with complex connectivity to... 详细信息
来源: 评论
Achieve distributed, scalable and effective access control in cloud storage services
Achieve distributed, scalable and effective access control i...
收藏 引用
ICINS 2014 - 2014 International Conference on Information and Network Security
作者: Su Huang Yuan Luo Department of Computer Science and Engineering Shanghai Jiao Tong University China
Cloud storage services enable users to remotely store their data and conveniently share their information. One critical issue is how to achieve data security and realize data access policy in cloud storage services. E... 详细信息
来源: 评论
Token based Privacy Preserving access control in Wireless Sensor Networks  21
Token based Privacy Preserving Access Control in Wireless Se...
收藏 引用
21st Annual International Conference on Advanced Computing and Communications (ADCOM)
作者: Tanuja, R. Shruthi, Y. R. Manjula, S. H. Venugopal, K. R. Patnaik, L. M. Bangalore Univ Coll Engn Univ Visvesvaraya Dept Comp Sci & Engn Bangalore Karnataka India Indian Inst Sci Bangalore Karnataka India
In large scale Wireless Sensor Network the network owner and the users of the sensor network may be different. A distributed access control module allows the users to access data from the network for which the user ha... 详细信息
来源: 评论
QoS-Aware Joint access control and Duty Cycle control for Machine-to-Machine Communications
QoS-Aware Joint Access Control and Duty Cycle Control for Ma...
收藏 引用
IEEE Global Communications Conference
作者: Yun Li Kok Keong Chai Yue Chen Jonathan Loo School of Electronic Engineering and Computer Science Queen Mary University of London School of Science and Technology Middlesex University
Massive devices and various applications imposes new challenges for Machine-to-Machine (M2M) communications to enable Internet of Things (IoT). In this paper, we investigate a QoS-aware joint access control and duty c... 详细信息
来源: 评论