共 50 条
- [31] A cloud-user access control mechanism based on data masking 2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 165 - 168
- [32] Research on Data Protection Based on Encrypted Attribute Access Control in Cloud Computing 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 450 - 453
- [34] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing 2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
- [35] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment Wireless Personal Communications, 2021, 116 : 3039 - 3060
- [37] Access control for Hadoop-based cloud computing Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 53 - 59
- [38] System security model based on trusted access control under cloud computing environment Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
- [39] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
- [40] Access control security model based on dual identity authentication in cloud computing environment Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 288 - 292