Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …
experts are seriously considering artificial intelligence as a potential field that can aid …
Cyberbiosecurity challenges of pathogen genome databases
Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA
fingerprinting methods, and single gene methods to methods relying on whole genomes …
fingerprinting methods, and single gene methods to methods relying on whole genomes …
Digital asset management with distributed permission over blockchain and attribute-based access control
Y Zhu, Y Qin, Z Zhou, X Song, G Liu… - … on services computing …, 2018 - ieeexplore.ieee.org
Digital asset management (DAM) has increasing benefits in booming global Internet
economy, but it is still a great challenge for providing an effective way to manage, store …
economy, but it is still a great challenge for providing an effective way to manage, store …
[HTML][HTML] AccessChain: An access control framework to protect data access in blockchain enabled supply chain
In recent years, supply chains have evolved into huge ecosystems, demanding trust,
provenance, and data privacy. Since blockchain technology (BCT) allows for the …
provenance, and data privacy. Since blockchain technology (BCT) allows for the …
TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization
Y Zhu, Y Qin, G Gan, Y Shuai… - 2018 IEEE 42nd annual …, 2018 - ieeexplore.ieee.org
In this paper we focus on a new generation of secure resource sharing platform in a
decentralized blockchain environment with flexible and diverse permission management, as …
decentralized blockchain environment with flexible and diverse permission management, as …
Token-based access control
Traditional centralized access control has some shortcomings in robustness, trustworthiness
and circulation. Blockchains have the advantages of fault tolerance and trust. Smart …
and circulation. Blockchains have the advantages of fault tolerance and trust. Smart …
Distributed consent protecting data across systems and services
J Simons - US Patent 10,749,676, 2020 - Google Patents
Non-limiting examples of the present disclosure relate to generation and implementation of
a new security protocol that is used to secure common data access transactions across …
a new security protocol that is used to secure common data access transactions across …
Epics: A framework for enforcing security policies in composite web services
With advances in cloud computing and the emergence of service marketplaces, the
popularity of composite services marks a paradigm shift from single-domain monolithic …
popularity of composite services marks a paradigm shift from single-domain monolithic …
Network access control based on distributed ledger
P Mahanta, B Kaur - US Patent 10,868,673, 2020 - Google Patents
BACKGROUND 10 (VM) 112, with multiple such VMs 112 operating on a single hardware
computing system. In addition, the applications of Cloud computing systems provide users …
computing system. In addition, the applications of Cloud computing systems provide users …
Scalable blockchain based smart contract execution
Blockchain, or distributed ledger, provides a way to build various decentralized systems
without relying on any single trusted party. This is especially attractive for smart contracts …
without relying on any single trusted party. This is especially attractive for smart contracts …