[1] |
YU Tianyi, LI Jianfeng, CHEN Hailong, ZHAI Jun.
Collaborative Recommendation Algorithm with Implicit Roles
[J]. Computer and Modernization, 2024, 0(09): 1-7.
|
[2] |
ZHU Ke1, XUAN Jiaxing2, XUE Wenhao2.
An Electronic License Access Control Method Based on Aggregation and Association of Smart Contracts
[J]. Computer and Modernization, 2024, 0(06): 103-108.
|
[3] |
Gulbostan Akim, Nurmamat Helil.
ABAC Decision Recycling with Dynamic Policy Change
[J]. Computer and Modernization, 2022, 0(10): 47-54.
|
[4] |
CAO Yu, LI Xiao-hui, LIU Zhong-lin, JIA He, FEI Zhi-wei.
Review of Big Data Workflow Orchestration and Management System in Cloud Environment
[J]. Computer and Modernization, 2022, 0(01): 41-53.
|
[5] |
LI Qian-shi, WANG Shu-ying, ZENG Wen-qu.
Research and Application of Flexible Workflow Path Change
[J]. Computer and Modernization, 2021, 0(11): 44-49.
|
[6] |
LIU Zheng, WU Ke-hua, YE Chun-xiao.
Security-enhanced Data Access Control for Multi-authority Cloud Storage
[J]. Computer and Modernization, 2021, 0(10): 119-126.
|
[7] |
LI Wen-quan, XU Su-ping.
Tourism Resource Information Database System Based on Geographic Information
[J]. Computer and Modernization, 2021, 0(08): 100-103.
|
[8] |
LIU Xue-zhen, CUI Yan, DENG Xiao-fei, PENG Jie.
An Efficient Attribute Revocation Scheme of Supporting Rights Management
[J]. Computer and Modernization, 2021, 0(07): 95-101.
|
[9] |
ZHAO Wei, QIN Li-han, YUN Chen-chao.
Cross Platform Access Control of Technology Achievement Data Based on Portal Authentication Technology#br#
[J]. Computer and Modernization, 2021, 0(07): 102-106.
|
[10] |
SUN Guang-cheng, LI Hong-zhe, LI Sai-fei, ZHANG Xiao-wei.
Internet of Things Access Control System Based on Blockchain
[J]. Computer and Modernization, 2020, 0(11): 100-108.
|
[11] |
MIAO Si-wei1, YU Wen-hao1, YAO Feng2, GAO Jing3.
Security Analysis for PLC Access Control
[J]. Computer and Modernization, 2019, 0(09): 41-.
|
[12] |
YANG Yang, CAO Yan.
Adaptive Access Control Model Based on Hazardous Events
[J]. Computer and Modernization, 2019, 0(08): 98-.
|
[13] |
ZHANG Peng, ZHOU Liang.
Trust-based Dynamic Multi-level Access Control Model
[J]. Computer and Modernization, 2019, 0(07): 116-.
|
[14] |
CHEN Cheng, Nurmamat HELIL.
Hidden Attribute Outsourced Decryption Access Control Scheme Based on CP-ABE
[J]. Computer and Modernization, 2018, 0(05): 74-.
|
[15] |
ZHANG Miaomiao, ZHANG Yujie, LIU Mingtong, XU Jinan, CHEN Yufeng.
#br#
Chinese Semantic Role Labeling Based on Gated Mechanism and BiLSTMCRF
[J]. Computer and Modernization, 2018, 0(04): 1-.
|