[1] |
LIU Xue-zhen, CUI Yan, DENG Xiao-fei, PENG Jie.
An Efficient Attribute Revocation Scheme of Supporting Rights Management
[J]. Computer and Modernization, 2021, 0(07): 95-101.
|
[2] |
SUN Guang-cheng, LI Hong-zhe, LI Sai-fei, ZHANG Xiao-wei.
Internet of Things Access Control System Based on Blockchain
[J]. Computer and Modernization, 2020, 0(11): 100-108.
|
[3] |
ZHOU Li-jing, WANG Min, QIN Lu-lu .
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority
[J]. Computer and Modernization, 2019, 0(11): 60-.
|
[4] |
SHEN Hai-bo.
Delegation Authorization Framework Based on OAuth 2.0
[J]. Computer and Modernization, 2016, 0(8): 105-108+122.
|
[5] |
GUO Long-hua1, XIA Zheng-min1, ZHENG Sheng-jun2, WANG Hong-kai3, MA Zhi-cheng4.
RBAC-based Security Access Scheme for Demand Response
[J]. Computer and Modernization, 2016, 0(3): 100-104+110.
|
[6] |
WEI Ming-lun, LYU Xin, XU Shu-fang, WANG Long-bao, LI Shui-yan, PING Ping, MA Hong-xu, LIU Xuan.
An Efficient Attribute Based Encryption Data Sharing Scheme of #br# Supporting Attribute Revocation
[J]. Computer and Modernization, 2016, 0(2): 66-71.
|
[7] |
YAO Wei, SHA Fengjie, LIN Xiaonan.
CPABE Scheme with Efficient Attribute Revocation
[J]. Computer and Modernization, 2015, 0(12): 48-.
|
[8] |
SONG Wanli1,2, WU Weifeng1.
System Users Access Control Based on Improved RBAC Model
[J]. Computer and Modernization, 2014, 0(9): 49-54.
|
[9] |
ZHOU Chun-rong, XIAO Xiang-lin,YANG Hua.
Design and Realization of Java Web Common Users Permissions Management Frame
[J]. Computer and Modernization, 2014, 0(3): 177-179,196.
|
[10] |
WANG Yuan1, YANG Yue-xiang2, DENG Wen-ping2.
A Ciphertext Access Control Scheme for Enterprise Synchronous Network Disk
[J]. Computer and Modernization, 2014, 0(3): 154-157,160.
|
[11] |
LUO Yu-dong.
Research on Application of ERBAC in Multi-enterprises Permission Management
[J]. Computer and Modernization, 2012, 1(10): 172-176.
|
[12] |
HAN Mei;LIN Zhen-rong;LI Jian-min.
Design of Privilege Mechanism Based on Expansion of Membership
[J]. Computer and Modernization, 2011, 7(7): 64-66,7.
|
[13] |
WANG Wei;CHENG Geng-guo .
Design and Implementation of Access Control Model Based on Classification Management
[J]. Computer and Modernization, 2011, 1(4): 84-87.
|
[14] |
CHANG Yan-de.
Research Progress on Role-based Access Control
[J]. Computer and Modernization, 2011, 12(12): 5-8.
|
[15] |
GUO Li-zi.
Development of Interactive Web Education System
[J]. Computer and Modernization, 2009, 1(12): 182-185.
|