A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme
暂无分享,去创建一个
[1] Chu-Hsing Lin,et al. Hierarchical key assignment without public-key cryptography , 2001, Comput. Secur..
[2] Hsing-Chung Chen,et al. A trusted user-to-role and role-to-key access control scheme , 2015, Soft Computing.
[3] Chien-Erh Weng,et al. Cognitive RBAC in mobile heterogeneous networks , 2013, Comput. Sci. Inf. Syst..
[4] Shiuh-Jeng Wang,et al. A Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy , 2008 .
[5] Shiuh-Jeng Wang,et al. Role-based proactive scheme in an access control hierarchy , 2007 .
[6] Hsing-Chung Chen,et al. A cognitive RBAC model with handover functions in small heterogeneous networks , 2013, Math. Comput. Model..
[7] Hsing-Chung Chen,et al. A mobile location-based with time-constraint RBAC associated database management model , 2012, Comput. Syst. Sci. Eng..
[8] Hsing-Chung Chen,et al. A Role-Based RSA Key Management Approach in a Hierarchy Scheme , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[9] Shiuh-Jeng Wang,et al. A Generalized Temporal and Spatial Role-Based Access Control Model , 2010, J. Networks.
[10] Hsing-Chung Chen. A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks , 2015, 2015 18th International Conference on Network-Based Information Systems.
[11] Hsing-Chung Chen,et al. Contract RBAC in cloud computing , 2013, The Journal of Supercomputing.