Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230400080-7.doi: 10.11896/jsjkx.230400080
• Information Security • Previous Articles Next Articles
TIAN Hongliang, XIAN Mingjie, GE Ping
CLC Number:
[1]ZHANG P,LIU H Y,LI W J,et al.Industrial intelligent network-deepening and upgrading of industrial Internet[J].Journal of Communications,2018,39(12):134-140. [2]SIKORSKI J,HAUGHTON J,KRAFT M.Blockchain techno-logy in the chemical industry:Machine-to-machine electricity market[J].Applied Energy,2017,195(JUN.1):234-246. [3]LI Z,KANG J,YU R,et al.Consortium Blockchain for SecureEnergy Trading in Industrial Internet of Things[J].IEEE Transactions on Industrial Informatics,2017,PP(99):1-1. [4]QIU C,YU F,YAO H,et al.Blockchain-Based Software-De-fined Industrial Internet of Things:A Dueling Deep Q-Learning Approach[J].IEEE Internet of Things Journal,2019,6(3):4627-4639. [5]WANG J,HAN W,ZHANG H,et al.Trust and Attribute-Based Dynamic Access Control Model for Internet of Things[C]//2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery(CyberC).2017. [6]LENG J,YE S,ZHOU M,et al.Blockchain-Secured Smart Ma-nufacturing in Industry 4.0:A Survey[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2021,51(1). [7]YANG Q,LU R,RONG C,et al.Guest Editorial The Convergence of Blockchain and IoT:Opportunities,Challenges and Solutions[J].IEEE Internet of Things Journal,2019,6(3):4556-4560. [8]LIU Q,ZHANG H,WAN J F,et al.An Access Control Model for Resource Sharing based on the Role-Based Access Control Intended for Multi-domain Manufacturing Internet of Things[J].IEEE Access,2017,5:7001-7011. [9]NING Y E,YAN Z,WANG R C,et al.An Efficient Authentica-tion and Access Control Scheme for Perception Layer of Internet of Things[J].Applied Mathematics & Information Sciences,2014,8(4). [10]GUSMEROLI S,PICCIONE S,ROTONDI D.A capability-based security approach to manage access control in the Internet of Things[J].Mathematical & Computer Modelling,2013,58(5/6):1189-1205. [11]ZHANG Y,SHOJI K,SHEN Y,et al.Smart Contract-Based Access Control for the Internet of Things[J].IEEE Internet of Things Journal,2019,6(2):1594-1605. [12]OSCAR N.Blockchain Meets IoT:An Architecture for Scalable Access Management in IoT[J].IEEE Internet of Things Journal,2018,5(2):1184-1195. [13]ZHANG Y,LI B,LIU B,et al.An Attribute-Based Collaborative Access Control Scheme Using Blockchain for IoT Devices[J].Electronics,2020,9(2):285. [14]BOURAS M,XIA B,ABUASSBA A,et al.IoT-CCAC:a blockchain-based consortium capability access control approach for IoT[J].PeerJ Computer Science,2021,7(3):e455. [15]NOVO O.Scalable Access Management in IoT using Block-chain:a Performance Evaluation[J].IEEE Internet of Things Journal,2019,6(3):4694-4701. [16]QI X,SIFAH E,AGYEKUM O,et al.Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments[J].IEEE Internet of Things Journal,2019,6(6):10749-10762. [17]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-Poli-cy.Attribute-Based Encryption[C]//IEEE Symposium on Security & Privacy.IEEE,2007. [18]SUN S,CHEN S,DU R.Trusted and Efficient Cross-Domain Access Control System Based on Blockchain[J].Scientific Programming,2020,2020(10):1-13. [19]XIE R N,LI H,SHI G Z,et al.Traceable access control mechanism based on blockchain[J].Journal of Communications,2020,41(12):82-93. |
[1] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[2] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[3] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
[4] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[5] | GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9. |
[6] | ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5. |
[7] | ZHAO Ziqi, YANG Bin, ZHANG Yuanguang. Hierarchical Traffic Flow Prediction Model Based on Graph Autoencoder and GRU Network [J]. Computer Science, 2024, 51(6A): 230400148-6. |
[8] | XU Yiran, ZHOU Yu. Prompt Learning Based Parameter-efficient Code Generation [J]. Computer Science, 2024, 51(6): 61-67. |
[9] | ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389. |
[10] | ZHAO Geng, WU Rui, MA Yingjie, HUANG Sijie, DONG Youheng. Three-dimensional OFDM Constellation Encryption Scheme Based on Perturbed Spatiotemporal Chaos [J]. Computer Science, 2024, 51(5): 390-399. |
[11] | LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387. |
[12] | LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47. |
[13] | WANG Dong, LI Zheng, XIAO Bingbing. Blockchain Coin Mixing Scheme Based on Homomorphic Encryption [J]. Computer Science, 2024, 51(3): 335-339. |
[14] | DONG Hao, ZHAO Hengtai, WANG Ziyao, YUAN Ye, ZHANG Aoqian. Parallel Transaction Execution Models Under Permissioned Blockchains [J]. Computer Science, 2024, 51(1): 124-132. |
[15] | TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25. |
|