CBR-based negotiation RBAC model for enhancing ubiquitous resources management
暂无分享,去创建一个
Hsing-Chung Chen | Shian-Shyong Tseng | Yen-Tsung Lin | Li-Ling Hu | S. Tseng | Li-Ling Hu | Hsing-Chung Chen | Yen-Tsung Lin
[1] Hsing-Chung Chen,et al. A trusted user-to-role and role-to-key access control scheme , 2015, Soft Computing.
[2] Chien-Erh Weng,et al. Cognitive RBAC in mobile heterogeneous networks , 2013, Comput. Sci. Inf. Syst..
[3] Shiuh-Jeng Wang,et al. A Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy , 2008 .
[4] Hsing-Chung Chen,et al. A cognitive RBAC model with handover functions in small heterogeneous networks , 2013, Math. Comput. Model..
[5] Marek R. Ogiela,et al. Cognitive systems for intelligent business information management in cognitive economy , 2014, Int. J. Inf. Manag..
[6] Hsing-Chung Chen,et al. Contract RBAC in cloud computing , 2013, The Journal of Supercomputing.
[7] Shiuh-Jeng Wang,et al. Role-based proactive scheme in an access control hierarchy , 2007 .
[8] Hsing-Chung Chen,et al. A Role-Based RSA Key Management Approach in a Hierarchy Scheme , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[9] Shiuh-Jeng Wang,et al. A Generalized Temporal and Spatial Role-Based Access Control Model , 2010, J. Networks.
[10] Hsing-Chung Chen. A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks , 2015, 2015 18th International Conference on Network-Based Information Systems.
[11] Agnar Aamodt,et al. Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..
[12] Hsing-Chung Chen. A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).
[13] Hsing-Chung Chen,et al. A mobile location-based with time-constraint RBAC associated database management model , 2012, Comput. Syst. Sci. Eng..
[14] Marek R. Ogiela,et al. Shadow Generation Protocol in Linguistic Threshold Schemes , 2009, FGIT-SecTech.
[15] Marek R. Ogiela,et al. Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.