Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dynamic access control and authorization system based on zero-trust architecture
Q Yao, Q Wang, X Zhang, J Fei - … of the 2020 1st international conference …, 2020 - dl.acm.org
With the development of cloud computing, artificial intelligence, big data and other
technologies, network systems are facing more and more security risks and threats. The …
technologies, network systems are facing more and more security risks and threats. The …
Self-adaptive and secure mechanism for IoT based multimedia services: a survey
With the advent of internet of things (IoT) and IoT multimedia services in real-time
applications, including smart healthcare, smart home, and smart connected transportation …
applications, including smart healthcare, smart home, and smart connected transportation …
[HTML][HTML] Zero Trust Cybersecurity: Procedures and Considerations in Context
Definition In response to the increasing complexity and sophistication of cyber threats,
particularly those enhanced by advancements in artificial intelligence, traditional security …
particularly those enhanced by advancements in artificial intelligence, traditional security …
Function-based access control (FBAC) from access control matrix to access control tensor
Y Desmedt, A Shaghaghi - Proceedings of the 8th ACM CCS …, 2016 - dl.acm.org
The misuse of legitimate access to data is a serious information security concern for both
organizations and individuals. From a security engineering viewpoint, this might be due to …
organizations and individuals. From a security engineering viewpoint, this might be due to …
An adaptation of context and trust aware workflow oriented access control for remote healthcare
Traditional discretionary access control (DAC) or mandatory access control (MAC) is not
quite effective for remote environment. General role-based access control (RBAC) also has …
quite effective for remote environment. General role-based access control (RBAC) also has …
Automated reverse engineering of role-based access control policies of web applications
Access control (AC) is an important security mechanism used in software systems to restrict
access to sensitive resources. Therefore, it is essential to validate the correctness of AC …
access to sensitive resources. Therefore, it is essential to validate the correctness of AC …
Modeling and enforcing access control policies for smart contracts
Ethereum smart contracts expose their functions to an untrusted network. Therefore, access
control is of utmost importance. Nevertheless, many smart contracts have suffered exploits …
control is of utmost importance. Nevertheless, many smart contracts have suffered exploits …
[PDF][PDF] Adaptive security schemes based on context and trust for ubiquitous computing environment: A comprehensive survey
G Jagadamba, BS Babu - Indian J. Sci. Technol, 2017 - sciresol.s3.us-east-2.amazonaws …
Objectives: To present the principle of working of some of the widely used adaptive security
schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main …
schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main …
Role based access control design using three-way formal concept analysis
CM Subramanian, AK Cherukuri, C Chelliah - International Journal of …, 2018 - Springer
Role based access control (RBAC) is one of the popular access control models. On
representing the policy behind RBAC, the literatures investigate the use of various …
representing the policy behind RBAC, the literatures investigate the use of various …
[HTML][HTML] A domain-specific language for the specification of UCON policies
AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …
trivial system, these security policies go beyond simple access control rules and must cover …