Computer Science ›› 2026, Vol. 53 ›› Issue (2): 187-195.doi: 10.11896/jsjkx.251000127
• Database & Big Data & Data Science • Previous Articles Next Articles
ZHANG Huan1, HOU Mingxing2, LIU Guangna3 , SHI Ying4
CLC Number:
| [1]BERTINO E,GHINITA G,KAMRA A.Access control for databases:Concepts and systems[J].Foundations and Trends in Databases,2011,3(1/2):1-148. [2]QIU J,TIAN Z,DU C,et al.A survey on access control in the age of internet of things[J].IEEE Internet of Things Journal,2020,7(6):4682-4696. [3]TONG F,SHAO R R.Research on Cloud Data Access Control Model Based on Blockchain[J].Computer Science,2023,50(9):16-25. [4]ZHANG S W,LI B Y,DENG L M.Context-aware Adaptive Access Control Model[J].Application Research of Computers,2024,41(9):2839-2845. [5]FAN F W.Research on sensitive data classification and intelligent access control technology in education industry[J].Cybersecurity & Informatization,2025(8):141-143. [6]HUANG J J,FANG Q.Access control model of cloud computing based on context and role[J].Computer Application,2015,35(2):393-396. [7]WANG X T,LIAN B.Analysis of an attribute-based dynamicaccess control technology[J].Integrated Circuit Application,2025,42(3):110-111. [8]BHATT S,PHAM T K,GUPTA M,et al.Attribute-based access control for AWS internet of things and secure industries of the future[J].IEEE Access,2021,9:107200-107223. [9]IKE C C,IGE A B,OLADOSU S A,et al.Redefining zero trust architecture in cloud networks:A conceptual shift towards granular,dynamic access control and policy enforcement[J].Magna Scientia Advanced Research and Reviews,2021,2(1):74-86. [10]TANVEER M,KUMAR N,NAUSHAD A,et al.A robust access control protocol for the smart grid systems[J].IEEE Internet of Things Journal,2021,9(9):6855-6865. [11]ZONG J,WANG C,SHEN J,et al.ReLAC:Revocable and lightweight access control with blockchain for smart consumer electronics[J].IEEE Transactions on Consumer Electronics,2023,70(1):3994-4004. [12]WANG Q X,DONG L J,JIA W,et al.Dynamic access control based on vector representation and calculation in open environment[J].Computer Science,2022,49(S2):727-733. [13]ATLAM H F,WALTERS R J,WILLS G B,et al.Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT[J].Mobile Networks and Applications,2021,26(6):2545-2557. [14]PAN R J,WANG G C,HUANG H G.Attribute Access Control Based on Dynamic User Trust in Cloud Computing[J].Computer Science,2021,48(5):313-319. [15]PARK J S,SANDHU R,AHN G J.Role-based access control on the web[J].ACM Transactions on Information and System Security,2001,4(1):37-71. [16]GOUGLIDIS A,MAVRIDIS I.domRBAC:An access controlmodel for modern collaborative systems[J].Computers & Secu-rity,2012,31(4):540-556. [17]WEI L,ZHANG J J,ZHANG X Y.Research and applicationanalysis of service dynamic access control combining deep lear-ning and adaptive[J].Modern Electronic Technique,2025,48(16):50-54. |
| [1] | ZHENG Kaifa, SUN Wei, ZHOU Junxu, WU Yunkun, XU Zhen, LIU Zhiquan , HE Qiang. Weakly-decentralized Scheme for Sensitive Data Sharing with Hierarchical Access Control [J]. Computer Science, 2026, 53(2): 431-441. |
| [2] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
| [3] | LUAN Fangjun, ZHANG Fengqiang, YUAN Shuai. Click-through Rate Prediction Model Based on Feature Embedding Gating and PolynomialFeature Crossover Networks [J]. Computer Science, 2025, 52(6A): 240900092-6. |
| [4] | HUANG Zhiyong, LI Bicheng, WEI Wei. Aspect-level Sentiment Analysis Models Based on Syntax and Semantics [J]. Computer Science, 2025, 52(6A): 240400193-7. |
| [5] | DU Qiangang, PENG Bo, CHI Mingmin. Remote Sensing Change Detection Based on Contextual Fine-grained Information Restoration [J]. Computer Science, 2025, 52(2): 183-190. |
| [6] | SU Xinzhong, XU Youyun. Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation [J]. Computer Science, 2025, 52(12): 331-338. |
| [7] | DING Yuanbo, BAI Lin, LI Taoshen. Human-Object Interaction Detection Based on Fine-grained Attention Mechanism [J]. Computer Science, 2025, 52(11): 141-149. |
| [8] | REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian. Web Access Control Vulnerability Detection Approach Based on Site Maps [J]. Computer Science, 2024, 51(9): 416-424. |
| [9] | LIANG Meiyan, FAN Yingying, WANG Lin. Fine-grained Colon Pathology Images Classification Based on Heterogeneous Ensemble Learningwith Multi-distance Measures [J]. Computer Science, 2024, 51(6A): 230400043-7. |
| [10] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
| [11] | ZHANG Haoyan, DUAN Liguo, WANG Qinchen, GAO Hao. Long Text Multi-entity Sentiment Analysis Based on Multi-task Joint Training [J]. Computer Science, 2024, 51(6): 309-316. |
| [12] | GU Wenxia, ZAOKERE Kadeer, YANG Qian, AISHAN Wumaier. Multilingual Opinion Factor Extraction Fusing Aspect Semantics and Grid Tagging [J]. Computer Science, 2024, 51(4): 324-333. |
| [13] | WANG Yuhan, MA Fuyuan, WANG Ying. Construction of Fine-grained Medical Knowledge Graph Based on Deep Learning [J]. Computer Science, 2024, 51(11A): 230900157-7. |
| [14] | PANG Bowen, CHEN Yifei, HUANG Jia. Fine-grained Entity Recognition Model in Audit Domain Based on Adversarial Migration ofSample Contributions [J]. Computer Science, 2024, 51(11A): 240300197-8. |
| [15] | MEN Ruirui, JIA Hongyong, DU Jinru. Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts [J]. Computer Science, 2024, 51(10): 372-379. |
|
||