Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authorization in trust management: Features and foundations
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …
allowing remotely accessible resources to be protected by providers. By allowing providers …
Privacy and contextual integrity: Framework and applications
Contextual integrity is a conceptual framework for understanding privacy expectations and
their implications developed in the literature on law, public policy, and political philosophy …
their implications developed in the literature on law, public policy, and political philosophy …
Trust-based security for wireless ad hoc and sensor networks
Wireless sensors networks are susceptible to a large number of security threats, and
because of the communication, computation and delay constraints of most applications that …
because of the communication, computation and delay constraints of most applications that …
[HTML][HTML] A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory
R Feng, X Xu, X Zhou, J Wan - Sensors, 2011 - mdpi.com
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless
links, battlefield applications and nodes exposed to the environment without good physical …
links, battlefield applications and nodes exposed to the environment without good physical …
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.
However, these models have often found to be inadequate for open and decentralized multi …
However, these models have often found to be inadequate for open and decentralized multi …
ROWLBAC: representing role based access control in OWL
There have been two parallel themes in access control research in recent years. On the one
hand there are efforts to develop new access control models to meet the policy needs of real …
hand there are efforts to develop new access control models to meet the policy needs of real …
Hails: Protecting data privacy in untrusted web applications
Many modern web-platforms are no longer written by a single entity, such as a company or
individual, but consist of a trusted core that can be extended by untrusted third-party authors …
individual, but consist of a trusted core that can be extended by untrusted third-party authors …
Detecting and resolving policy misconfigurations in access-control systems
Access-control policy misconfigurations that cause requests to be erroneously denied can
result in wasted time, user frustration, and, in the context of particular applications (eg, health …
result in wasted time, user frustration, and, in the context of particular applications (eg, health …
Security and trust issues in semantic grids
Grid computing allows sharing of services and resources accross institutions. However,
current Grid security mechanisms for authentication and authorization are too rigid and they …
current Grid security mechanisms for authentication and authorization are too rigid and they …
An attribute-based access control model for web services
H Shen, F Hong - 2006 Seventh International Conference on …, 2006 - ieeexplore.ieee.org
Web service is a new service-oriented computing paradigm which poses the unique security
challenges due to its inherent heterogeneity, multi-domain characteristic and highly dynamic …
challenges due to its inherent heterogeneity, multi-domain characteristic and highly dynamic …