Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
暂无分享,去创建一个
Xiangyang Luo | Zhigang Li | Qikun Zhang | Yongjiao Li | Junling Yuan | Yong Gan | Qikun Zhang | Xiangyang Luo | Yongjiao Li | Yong Gan | Junling Yuan | Zhigang Li
[1] Shaowen Wang,et al. LaSa: Location Aware Wireless Security Access Control for IoT Systems , 2018, Mobile Networks and Applications.
[2] Ghassan Sabeeh Mahmood,et al. A Secure Cloud Computing System by Using Encryption and Access Control Model , 2019, J. Inf. Process. Syst..
[3] Diego Reforgiato Recupero,et al. A Probabilistic-driven Ensemble Approach to Perform Event Classification in Intrusion Detection System , 2018, KDIR.
[4] Morteza Amini,et al. Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition , 2019, IEEE Transactions on Services Computing.
[5] Giovanni Pau,et al. Towards 5G and beyond for the internet of UAVs, vehicles, smartphones, Sensors and Smart Objects , 2019, J. Netw. Comput. Appl..
[6] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Giovanni Pau,et al. An Overview of Vehicular Communications , 2019, Future Internet.
[8] Peilin Hong,et al. An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage , 2019, IEEE Transactions on Information Forensics and Security.
[9] Mohsen Guizani,et al. Priority-Based Medium Access Control for Wireless Body Area Networks With High-Performance Design , 2019, IEEE Internet of Things Journal.
[10] R. Kavitha,et al. Efficient and Secure Privacy Analysis for Medical Big Data Using TDES and MKSVM with Access Control in Cloud , 2019, Journal of Medical Systems.
[11] Ali Ismail Awad,et al. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.
[12] Arputharaj Kannan,et al. Secure cloud‐based e‐learning system with access control and group key mechanism , 2019, Concurr. Comput. Pract. Exp..
[13] Yi Mu,et al. A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance , 2019, Future Gener. Comput. Syst..
[14] Rui Guo,et al. A Distributed Access Control with Outsourced Computation in Fog Computing , 2019, Secur. Commun. Networks.
[15] Vijay Varadharajan,et al. Policy-based access control for constrained healthcare resources in the context of the Internet of Things , 2019, J. Netw. Comput. Appl..
[16] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[17] Bünyamin Ciylan,et al. Application model for privileged account access control system in enterprise networks , 2019, Comput. Secur..
[18] Shehzad Khalid,et al. Security and privacy based access control model for internet of connected vehicles , 2019, Future Gener. Comput. Syst..
[19] Laura Ricci,et al. A blockchain based approach for the definition of auditable Access Control systems , 2019, Comput. Secur..
[20] Wei Li,et al. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.
[21] Najoua Essoukri Ben Amara,et al. Double watermarking‐based biometric access control for radio frequency identification card , 2019, International Journal of RF and Microwave Computer-Aided Engineering.
[22] Witold Pedrycz,et al. IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT , 2019, Future Gener. Comput. Syst..
[23] Syam Kumar Pasupuleti,et al. A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud , 2018, Journal of Ambient Intelligence and Humanized Computing.
[24] Jie Cui,et al. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage , 2016, Soft Computing.
[25] Giovanni Pau,et al. Next Generation Wireless Technologies for Internet of Things , 2018, Sensors.
[26] Chen Li,et al. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.
[27] D. Chitra,et al. Data Access Control and Secured Data Sharing Approach for Health Care Data in Cloud Environment , 2019, Journal of Medical Systems.
[28] Hongbo Zhu,et al. Fine-grained multi-authority access control in IoT-enabled mHealth , 2019, Ann. des Télécommunications.
[29] Khalid Mahmood Awan,et al. Barrier Access Control Using Sensors Platform and Vehicle License Plate Characters Recognition , 2019, Sensors.
[30] Emmanuel Bertin,et al. Access control in the Internet of Things: a survey of existing approaches and open research questions , 2019, Annals of Telecommunications.
[31] Christian Bettstetter,et al. On Access Control in Cabin-Based Transport Systems , 2018, IEEE Transactions on Intelligent Transportation Systems.
[32] Mohamed Abid,et al. A comprehensive survey on wireless sensor node hardware platforms , 2018, Comput. Networks.
[33] Akhan Akbulut,et al. Survey on Access Control Mechanisms in Cloud Computing , 2018, J. Cyber Secur. Mobil..
[34] Jingwei Shang,et al. A privacy protection method for health care big data management based on risk access control , 2019, Health Care Management Science.
[35] Diego Reforgiato Recupero,et al. A Discretized Extended Feature Space (DEFS) Model to Improve the Anomaly Detection Performance in Network Intrusion Detection Systems , 2019, KDIR.
[36] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.
[37] Dijiang Huang,et al. Attribute-based Access Control for ICN Naming Scheme , 2014, IEEE Transactions on Dependable and Secure Computing.
[38] Mohammad S. Obaidat,et al. TACRM: trust access control and resource management mechanism in fog computing , 2019, Human-centric Computing and Information Sciences.
[39] Diego Reforgiato Recupero,et al. Internet of Entities (IoE): A Blockchain-based Distributed Paradigm for Data Exchange between Wireless-based Devices , 2019, SENSORNETS.
[40] Albert C. Esterline,et al. Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[41] Yi Zhu,et al. An edge re‐encryption‐based access control mechanism in NDN , 2019, Trans. Emerg. Telecommun. Technol..