Parametric and adaptive encryption of feature-based computer-aided design models for cloud-based collaboration
暂无分享,去创建一个
W. D. Li | Sheng Wang | X. T. Cai | Xin Lu | Y. W. Liang | Weidong Li | Sheng Wang | Xin Lu | X. Cai | Y. Liang
[1] H. Chang,et al. The Development of Security System for Sharing CAD Drawings in u-Environment , 2008, Comput. Informatics.
[2] Jeffrey J. Rodríguez,et al. Mixed signal design watermarking for IP protection , 2003, Integr. Comput. Aided Eng..
[3] Yuki Mano,et al. Development of a New Testing Machine for Torque/Clamp Force Testing for Threaded Fasteners in Accordance with ISO 16047 , 2009 .
[4] JungHyun Han,et al. Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD , 2006, J. Comput. Inf. Sci. Eng..
[5] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[6] Judith M. Whipple,et al. Global supply chain design considerations: Mitigating product safety and security risks , 2011 .
[7] A. Ben Hamza,et al. Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..
[8] Shao Jian,et al. Research on a Security Model of Data in Computer Supported Collaborative Design Integrated with PDM System , 2007 .
[9] Pieter van der Wolf,et al. A flexible access control mechanism for CAD frameworks , 1994, EURO-DAC '94.
[10] Xiao Chen,et al. Flexible Concurrency Control for Legacy CAD to Construct Collaborative CAD Environment , 2012 .
[11] W. D. Li,et al. Encryption based partial sharing of CAD models , 2015, Integr. Comput. Aided Eng..
[12] Naveen K. Nishchal,et al. Known-plaintext attack on encryption domain independent optical asymmetric cryptosystem , 2013 .
[13] W. B. Lee,et al. A security model for distributed product data management system , 2003, Comput. Ind..
[14] Ming Li,et al. The Research of Network Security Mechanism Based Collaborative Design , 2011 .
[15] ShenWeiming,et al. An integrated feature-based dynamic control system for on-line machining, inspection and monitoring , 2015 .
[16] Fazhi He,et al. Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment , 2015 .
[17] William L. Maxwell,et al. On the implementation of security measures in information systems , 1972, CACM.
[18] Sang Hun Lee. Feature-based multiresolution modeling of solids , 2005, TOGS.
[19] Chih-Hsing Chu,et al. Multi-agent collaborative 3D design with geometric model at different levels of detail , 2009 .
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[21] Myrian Tebaldi,et al. Chosen-plaintext attack on a joint transform correlator encrypting system , 2010 .
[22] Weiming Shen,et al. An integrated feature-based dynamic control system for on-line machining, inspection and monitoring , 2015, Integr. Comput. Aided Eng..
[23] Christopher M. Schlick,et al. Modelling and simulation of the task scheduling behavior in collaborative product development process , 2013, Integr. Comput. Aided Eng..
[24] Volker Wulf,et al. A new dimension in access control: studying maintenance engineering across organizational boundaries , 2002, CSCW '02.
[25] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[26] Kirk Sattley. Letters to the editor: corrections to Sattley paper in January communications , 1961, CACM.
[27] Salmiah Ahmad,et al. Modelling and simulation of double-link scenario in a two-wheeled wheelchair , 2014, Integr. Comput. Aided Eng..
[28] Jian Shao,et al. Research on a Security Model of Data in Computer Supported Collaborative Design Integrated with PDM System , 2007, Workshop on Intelligent Information Technology Application (IITA 2007).
[29] Jing Wang,et al. A wavelet-based particle swarm optimization algorithm for digital image watermarking , 2012, Integr. Comput. Aided Eng..
[30] Steve Benford,et al. An access control framework for multi-user collaborative environments , 1999, GROUP.
[31] Yong Zeng,et al. Secure collaboration in global design and supply chain environment: Problem analysis and literature review , 2012, Comput. Ind..
[32] Thies Wittig,et al. Real-time expert systems for industrial control , 1995 .
[33] Simon Li,et al. A matrix-based modularization approach for supporting secure collaboration in parametric design , 2012, Comput. Ind..
[34] Kamel Rouibah,et al. Dynamic data sharing and security in a collaborative product definition management system , 2007 .
[35] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[36] Zhong Ren,et al. A method of 3D data information encryption with virtual holography , 2009, International Workshop on Information Data Storage and International Symposium on Optical Storage.
[37] Naveen K. Nishchal,et al. Flexible optical encryption with multiple users and multiple security levels , 2011 .
[38] JungHyun Han,et al. Role-Based Viewing for Secure Collaborative Modeling , 2003 .
[39] Kunwoo Lee,et al. Feature-based Multi-resolution and Multi-abstraction Non-manifold Modeling System to Provide Integrated Environment for Design and Analysis of Injection Molding Products , 2005 .
[40] Hangbae Chang,et al. The Research of Security System for Sharing Engineering Drawings , 2007, The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007).