RuleSN: Research and Application of Social Network Access Control Model
暂无分享,去创建一个
Keke Gai | Li Ma | Lixin Tao | Yong Zhong | Lixin Tao | Keke Gai | Li Ma | Yong Zhong
[1] Keke Gai,et al. Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm , 2015, IEEE Transactions on Computers.
[2] Keke Gai,et al. Adaptive Resource Allocation Optimization in Heterogeneous Mobile Cloud Systems , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[3] Keke Gai,et al. Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..
[4] Yuan Cheng,et al. Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[5] Mudhakar Srivatsa,et al. Fine-grained access control of personal data , 2012, SACMAT '12.
[6] Qi Li,et al. Multi-tenancy authorization models for collaborative cloud services , 2013, CTS.
[7] Joaquín Salvachúa,et al. Tie-RBAC: An application of RBAC to Social Networks , 2012, ArXiv.
[8] Keke Gai,et al. An Empirical Study on Preprocessing High-Dimensional Class-Imbalanced Data for Classification , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[9] Keke Gai,et al. Efficiency-Aware Workload Optimizations of Heterogeneous Cloud Computing for Capacity Planning in Financial Industry , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[10] Keke Gai,et al. A Reusable Software Component for Integrated Syntax and Semantic Validation for Services Computing , 2015, 2015 IEEE Symposium on Service-Oriented System Engineering.
[11] Meikang Qiu,et al. Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads , 2013, TECS.
[12] Keke Gai,et al. Electronic Health Record Error Prevention Approach Using Ontology in Big Data , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[13] Jose M. Such,et al. Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services , 2015, Int. J. Hum. Comput. Interact..
[14] Keke Gai,et al. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G , 2016, Secur. Commun. Networks.
[15] Meikang Qiu,et al. Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.
[16] Min Chen,et al. Energy Optimization With Dynamic Task Scheduling Mobile Cloud Computing , 2017, IEEE Systems Journal.
[17] Keke Gai,et al. Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[18] Keke Gai,et al. A Feasibility Study of Platform-as-a-Service Using Cloud Computing for a Global Service Organization , 2014 .
[19] Barbara Carminati,et al. Rule-Based Access Control for Social Networks , 2006, OTM Workshops.
[20] Meikang Qiu,et al. Resource allocation robustness in multi-core embedded systems with inaccurate information , 2011, J. Syst. Archit..
[21] Gail-Joon Ahn,et al. Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.
[22] Keke Gai,et al. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..
[23] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[24] Zhao Du,et al. Relation Based Access Control in Campus Social Network System , 2013, ITQM.
[25] Asmaa Alsumait,et al. Trust inference algorithms for social networks , 2014 .
[26] Keke Gai,et al. Anti-Counterfeit Scheme Using Monte Carlo Simulation for E-commerce in Cloud Systems , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[27] Andrew C. Simpson,et al. On the need for user-defined fine-grained access control policies for social networking applications , 2008, SOSOC '08.
[28] Bhavani M. Thuraisingham,et al. Semantic web-based social network access control , 2011, Comput. Secur..
[29] Min Chen,et al. Balance of security strength and energy for a PMU monitoring system in smart grid , 2012, IEEE Communications Magazine.
[30] Keke Gai,et al. Towards Cloud Computing: A Literature Review on Cloud Computing and Its Development Trends , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.
[31] Meikang Qiu,et al. Online optimization for scheduling preemptable tasks on IaaS cloud systems , 2012, J. Parallel Distributed Comput..