Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy requirements for the internet of things: A survey
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
An extensive systematic review on the model-driven development of secure systems
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …
Engineering research area for supporting the development of secure systems. Over a …
Design notations for secure software: a systematic literature review
In the past 10 years, the research community has produced a significant number of design
notations to represent security properties and concepts in a design artifact. These notations …
notations to represent security properties and concepts in a design artifact. These notations …
Requirements modeling languages for software product lines: A systematic literature review
Abstract Context: Software product lines (SPLs) have reached a considerable level of
adoption in the software industry, having demonstrated their cost-effectiveness for …
adoption in the software industry, having demonstrated their cost-effectiveness for …
Role based access control design using three-way formal concept analysis
Role based access control (RBAC) is one of the popular access control models. On
representing the policy behind RBAC, the literatures investigate the use of various …
representing the policy behind RBAC, the literatures investigate the use of various …
VCU: the three dimensions of reuse
Reuse, enabled by modularity and interfaces, is one of the most important concepts in
software engineering. This is evidenced by an increasingly large number of reusable …
software engineering. This is evidenced by an increasingly large number of reusable …
Introducing attribute-based access control to AUTOSAR
Cyber security concerns in the automotive industry have been constantly increasing as
automobiles are more computerized and networked. AUTOSAR is the standard architecture …
automobiles are more computerized and networked. AUTOSAR is the standard architecture …
A 4D‐Role Based Access Control Model for Multitenancy Cloud Platform
Since more and more applications and services have been transferred from servers in the
B/S architecture to cloud, user access control has become a significant part in a multitenancy …
B/S architecture to cloud, user access control has become a significant part in a multitenancy …
Building hybrid access control by configuring RBAC and MAC features
Abstract Context Role-Based Access Control (RBAC) and Mandatory Access Control (MAC)
are widely used access control models. They are often used together in domains where both …
are widely used access control models. They are often used together in domains where both …
Role based access control design using triadic concept analysis
Role based access control is one of the widely used access control models. There are
investigations in the literature that use knowledge representation mechanisms such as …
investigations in the literature that use knowledge representation mechanisms such as …