Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
On the interplay between cyber and physical spaces for adaptive security
Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or
manage valuable physical and digital assets. These assets can be harmed by malicious …
manage valuable physical and digital assets. These assets can be harmed by malicious …
The EGRBAC model for smart home IoT
The Internet of Things (IoT) is enabling smart houses, where multiple users with complex
social relationships interact with smart devices. This requires sophisticated access control …
social relationships interact with smart devices. This requires sophisticated access control …
A topology and risk-aware access control framework for cyber-physical space
Y Cao, Z Huang, Y Yu, C Ke, Z Wang - Frontiers of Computer Science, 2020 - Springer
Cyber-physical space is a spatial environment that integrates the cyber world and the
physical world, aiming to provide an intelligent environment for users to conduct their day-to …
physical world, aiming to provide an intelligent environment for users to conduct their day-to …
Self-generation of access control policies
Access control for information has primarily focused on access statically granted to subjects
by administrators usually in the context of a specific system. Even if mechanisms are …
by administrators usually in the context of a specific system. Even if mechanisms are …
G-sir: an insider attack resilient geo-social access control framework
Insider attacks are among the most dangerous and costly attacks to organizations. These
attacks are carried out by individuals who are legitimately authorized to access the system …
attacks are carried out by individuals who are legitimately authorized to access the system …
Towards a privacy-aware quantified self data management framework
Massive amounts of data are being collected, stored, and analyzed for various business and
marketing purposes. While such data analysis is critical for many applications, it could also …
marketing purposes. While such data analysis is critical for many applications, it could also …
A formal proximity model for RBAC systems
To combat the threat of information leakage through pervasive access, researchers have
proposed several extensions to the popular role-based access control (RBAC) model. Such …
proposed several extensions to the popular role-based access control (RBAC) model. Such …
Access control models for geo-social computing systems
A Geo-Social Computing System (GSCS) allows users to declare their current locations, and
uses these declared locations to make authorization decisions. Recent years have seen the …
uses these declared locations to make authorization decisions. Recent years have seen the …
A model-driven approach to representing and checking RBAC contextual policies
Among the various types of Role-based access control (RBAC) policies proposed in the
literature, contextual policies take into account the user's location and the time at which she …
literature, contextual policies take into account the user's location and the time at which she …