全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Seungtae Hong , Hyeong-Il Kim , Jae-Woo Chang
来源:[J].World Wide Web(IF 1.196), 2017, Vol.20 (3), pp.467-490Springer
摘要:Recently, researches on key management scheme for user access control in outsourced databases have been actively done. Because outsourced databases require dealing with a lot of users and data resources, an efficient key management scheme for reducing the number of authentication...
作者:Santanu Chatterjee , Ashok Kumar Das
来源:[J].Security and Communication Networks(IF 0.311), 2015, Vol.8 (9), pp.1752-1771Wiley
摘要:Abstract(#br)For critical applications, real‐time data access is essential from the nodes inside a wireless sensor network (WSN). Only the authorized users with unique access privilege should access the specific, but not all, sensing information gathered by the cluster hea...
作者:Haodong Wang , Qun Li
来源:[J].Ad Hoc Networks(IF 1.456), 2011, Vol.10 (3), pp.272-283Elsevier
摘要:Abstract(#br)User access control in sensor networks defines a process of granting user an access right to the stored information. It is essential for future real sensor network deployment in which sensors may provide users with different services in terms of data and resource acc...
作者:M. Mohammadian , D. Hatzinakos
来源:[J].International Journal of Information Technology, 2017, Vol.9 (2), pp.147-157Springer
摘要:... This paper demonstrates how a HFL system can be employed to improve data security, privacy and user access control to determine data and user access control based on data sensitivity government and organizational data security requirements and user level security measures.
作者:Santanu Chatterjee , Ashok Kumar Das , Jamuna Kanta Sing
来源:[J].Journal of King Saud University - Computer and Information Sciences, 2014, Vol.26 (2), pp.181-201Elsevier
摘要:... Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-bas...
作者:Ho-Kyung Yang , Jeong-Kyung Moon , Cheol-Rim Choi ...
来源:[J].International Journal of Distributed Sensor Networks(IF 0.727), 2014, Vol.2014Hindawi
摘要:... To address these issues, in this paper an AA (Attribute Authority) server is added to VoIP to design an authentication system with bolstered security and differentiated user access.
作者:Santanu Chatterjee , Ashok Kumar Das , Jamuna Kanta Sing
来源:[J].Journal of King Saud University: Computer and Information Sciences, 2014, Vol.26 (2), pp.181-201DOAJ
摘要:... Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-bas...
作者:K.K. Leong , K.M. Yu , W.B. Lee
来源:[J].Computers in Industry(IF 1.709), 2003, Vol.50 (2), pp.179-193Elsevier
摘要:... Dealing with these tremendous amounts of interaction between the system and the various users, the utmost importance is to ensure that all data are secured and all users are under controlled and managed. Therefore, the security of DPDM system has been of great concern to in...
作者:S.H Yang , X Chen , J.L Alty
来源:[J].Control Engineering Practice(IF 1.669), 2003, Vol.11 (6), pp.709-720Elsevier
摘要:Abstract(#br)The Internet provides great potential for the high-level control of process plants. Internet-based process control is a new concept which has been received much attention in previous years. However, little work has so far been done aimed at developing systematic desi...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×