[1] |
ZHU Ke1, XUAN Jiaxing2, XUE Wenhao2.
An Electronic License Access Control Method Based on Aggregation and Association of Smart Contracts
[J]. Computer and Modernization, 2024, 0(06): 103-108.
|
[2] |
Gulbostan Akim, Nurmamat Helil.
ABAC Decision Recycling with Dynamic Policy Change
[J]. Computer and Modernization, 2022, 0(10): 47-54.
|
[3] |
LIU Zheng, WU Ke-hua, YE Chun-xiao.
Security-enhanced Data Access Control for Multi-authority Cloud Storage
[J]. Computer and Modernization, 2021, 0(10): 119-126.
|
[4] |
LI Wen-quan, XU Su-ping.
Tourism Resource Information Database System Based on Geographic Information
[J]. Computer and Modernization, 2021, 0(08): 100-103.
|
[5] |
LIU Xue-zhen, CUI Yan, DENG Xiao-fei, PENG Jie.
An Efficient Attribute Revocation Scheme of Supporting Rights Management
[J]. Computer and Modernization, 2021, 0(07): 95-101.
|
[6] |
ZHAO Wei, QIN Li-han, YUN Chen-chao.
Cross Platform Access Control of Technology Achievement Data Based on Portal Authentication Technology#br#
[J]. Computer and Modernization, 2021, 0(07): 102-106.
|
[7] |
SUN Guang-cheng, LI Hong-zhe, LI Sai-fei, ZHANG Xiao-wei.
Internet of Things Access Control System Based on Blockchain
[J]. Computer and Modernization, 2020, 0(11): 100-108.
|
[8] |
MIAO Si-wei1, YU Wen-hao1, YAO Feng2, GAO Jing3.
Security Analysis for PLC Access Control
[J]. Computer and Modernization, 2019, 0(09): 41-.
|
[9] |
YANG Yang, CAO Yan.
Adaptive Access Control Model Based on Hazardous Events
[J]. Computer and Modernization, 2019, 0(08): 98-.
|
[10] |
ZHANG Peng, ZHOU Liang.
Trust-based Dynamic Multi-level Access Control Model
[J]. Computer and Modernization, 2019, 0(07): 116-.
|
[11] |
CHEN Cheng, Nurmamat HELIL.
Hidden Attribute Outsourced Decryption Access Control Scheme Based on CP-ABE
[J]. Computer and Modernization, 2018, 0(05): 74-.
|
[12] |
LIU Sai1, NIE Qing-jie1, LIU Jun1, LI Dong-min2, LI Jing2.
A New Access Control Model for Real Time Database #br#
Backup System Based on Quantified Action
[J]. Computer and Modernization, 2018, 0(01): 116-122.
|
[13] |
SHI Ting-jun, ZHANG Ying-jie.
Method of Access Control of Attribute-based Ciphertext Policy for Cloud Storage
[J]. Computer and Modernization, 2017, 0(7): 111-116.
|
[14] |
WEI Ming-lun, LYU Xin, XU Shu-fang, WANG Long-bao, LI Shui-yan, PING Ping, MA Hong-xu, LIU Xuan.
An Efficient Attribute Based Encryption Data Sharing Scheme of #br# Supporting Attribute Revocation
[J]. Computer and Modernization, 2016, 0(2): 66-71.
|
[15] |
JI Kai-wei, LE Hong-bing.
Research and Application of Rule Engine on Access Control
[J]. Computer and Modernization, 2015, 0(8): 75-79.
|