[1] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[2] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[3] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|
[4] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[5] |
YIN Longxiao, WU Zhongdong.
Revocation Control Scheme in CP-ABE
[J]. Computer Engineering and Applications, 2020, 56(13): 100-105.
|
[6] |
WANG Jingyu, LUAN Junqing, TAN Yuesheng.
Research on Big Data Access Control Model Based on Data Sensitivity
[J]. Computer Engineering and Applications, 2019, 55(23): 70-77.
|
[7] |
CHEN Lu, WANG Ze.
Access Control Scheme Based on ATP-ABE
[J]. Computer Engineering and Applications, 2019, 55(2): 79-85.
|
[8] |
TAN Yuesheng, LU Liming, WANG Jingyu.
Ciphertext-Policy Attribute Encryption Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2019, 55(19): 115-120.
|
[9] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|
[10] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|
[11] |
PENG Fei1, ZHANG Tao1, XU Weiguang1, ZHAO Min1, QIN Hengjia2.
Security policy generation model of operating system based on ontology
[J]. Computer Engineering and Applications, 2018, 54(2): 114-118.
|
[12] |
TAN Yuesheng, NING Ning, WANG Jingyu.
Research of cloud data access control based on Purpose-Based Access Control and Attribute-Based Encryption
[J]. Computer Engineering and Applications, 2018, 54(13): 117-122.
|
[13] |
XIA Zhijian, PENG Guojun, HU Hongfu.
Detection of access control vulnerabilities in Web applications based on privilege verification graph
[J]. Computer Engineering and Applications, 2018, 54(12): 63-68.
|
[14] |
GUO Jing, WANG Xuecheng, YUAN Chunping.
Survey on MAC layer rate control mechanisms
[J]. Computer Engineering and Applications, 2017, 53(6): 7-13.
|
[15] |
ZHANG Sai, YANG Geng, HAN Yamei, TU Yuanfei.
Attribute-based hierarchical access control with hidden policy supporting attribute revocation
[J]. Computer Engineering and Applications, 2017, 53(4): 51-58.
|