Computer Science ›› 2018, Vol. 45 ›› Issue (11): 176-179.doi: 10.11896/j.issn.1002-137X.2018.11.027
• Information Security • Previous Articles Next Articles
TU Yuan-fei1,2,3, GAO Zhen-yu3, LI Rong-yu3
CLC Number:
[1]MA J.Design and implementation access control system based on the AWS[J].Electronic Design Engineering,2016,24(6):182-184.(in Chinese) 马洁.基于AWS的访问控制系统设计与实现[J].电子设计工程,2016,24(6):182-184. [2]HU X Y.Cloud Storage Data Dynamic Access Control Method Research and Simulation[J].Computer Simulation,2017,34(3):365-368.(in Chinese) 胡晓燕.云计算存储数据动态访问控制方法研究与仿真[J].计算机仿真,2017,34(3):365-368. [3]ZHOU M K.Design for Strategy of Safety Access Control Cloud Computing Based on CP-ABE and Improved Attribute Encryption[J].Computer Measurement & Control,2015,23(1):297-299.(in Chinese) 周明快.基于CP-ABE的云计算改进属性加密安全访问控制策略设计[J].计算机测量与控制,2015,23(1):297-299. [4]HUANG Z P.Efficient Concurrent Access Control Algorithm Based on Distributed B Tree Encoding[J].Bulletin of Science and Technology,2015,31(8):81-83.(in Chinese) 黄正鹏.基于分布式B树编译的高效并发访问控制算法[J].科技通报,2015,31(8):81-83. [5]WANG T,YU J P,HUANG M Q.A Fast ABE Scheme in Access Control of Cloud Storage[J].Science Technology and Engineering,2017,17(1):54-60.(in Chinese) 王廷,喻建平,黄敏强.云存储访问控制中的快速属性基加密方案[J].科学技术与工程,2017,17(1):54-60. [6]LIU Y,CHEN C K,CUI Z R.Optimization Research on Adaptive Back off Tuning Medium Access Control Algorithm[J].Computer Engineering,2017,43(1):162-167.(in Chinese) 刘云,陈昌凯,崔自如.自适应退避调整介质访问控制算法的优化研究[J].计算机工程,2017,43(1):162-167. [7]TU Y F,XIA F,YANG G.Privacy-preserving Ciphertext-Policy Attribute-Based Encryption in Hybrid Cloud[J].Microelectronics & Computer,2016,33(10):53-58.(in Chinese) 屠袁飞,夏峰,杨庚.混合云下面向隐私保护的访问控制方法[J].微电子学与计算机,2016,33(10):53-58. [8]ZHANG X Y.Research on access control algorithm of heterogeneous services polymerizatio[J].Journal of Sichuan University(Natural Science Edition),2015,52(6):1277-1284.(in Chinese) 张秀玉.异构服务聚合的协同访问控制算法研究[J].四川大学学报(自然科学版),2015,52(6):1277-1284. [9]PAN Y,YUAN C A,LI W J,et al.Access Control Method for Supporting Update Operations in Dataspace[J].Journal of Electronics & Information Technology,2016,38(8):1935-1941.(in Chinese) 潘颖,元昌安,李文敬,等.一种支持更新操作的数据空间访问控制方法[J].电子与信息学报,2016,38(8):1935-1941. [10]WANG J Y,FENG L X,ZHENG X F.Attribute-based access control model for cloud computing[J].Journal of Central South University (Science and Technology),2015,46(6):2090-2097.(in Chinese) 王静宇,冯黎晓,郑雪峰.一种面向云计算环境的属性访问控制模型[J].中南大学学报(自然科学版),2015,46(6):2090-2097. [11]HUANG Z P.Efficient Concurrent Access Control Algorithm Based on Distributed B Tree Encoding[J].Bulletin of Science and Technology,2015,31(8):81-83.(in Chinese) 黄正鹏.基于分布式B树编译的高效并发访问控制算法[J].科技通报,2015,31(8):81-83. LIU C Y,YU W S.Access Control Model of Learning Flow Based on Task and Role.Journal of Chongqing University of Technology(Natural Science),2013,27(12):72-76.(in Chinese) 刘长勇,余文森.基于任务和角色的学习流访问控制模型.重庆理工大学学报(自然科学),2013,27(12):72-76. |
[1] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[2] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[3] | GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316. |
[4] | CHENG Xue-lin, YANG Xiao-hu, ZHUO Chong-kui. Research and Implementation of Data Authority Control Model Based on Organization [J]. Computer Science, 2021, 48(6A): 558-562. |
[5] | PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319. |
[6] | CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190. |
[7] | HE Heng, JIANG Jun-jun, FENG Ke, LI Peng, XU Fang-fang. Efficient Multi-keyword Retrieval Scheme Based on Attribute Encryption in Multi-cloud Environment [J]. Computer Science, 2021, 48(11A): 576-584. |
[8] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[9] | WANG Jing-yu, LIU Si-rui. Research Progress on Risk Access Control [J]. Computer Science, 2020, 47(7): 56-65. |
[10] | GU Rong-Jie, WU Zhi-ping and SHI Huan. New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model [J]. Computer Science, 2020, 47(6A): 400-403. |
[11] | PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318. |
[12] | WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291. |
[13] | TU Yuan-fei,ZHANG Cheng-zhen. Secure and Efficient Electronic Health Records for Cloud [J]. Computer Science, 2020, 47(2): 294-299. |
[14] | QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101. |
[15] | WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun. Client Puzzle Based Access Control Model in Public Blockchain [J]. Computer Science, 2019, 46(4): 129-136. |
|