共 50 条
- [1] System security model based on trusted access control under cloud computing environment Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
- [2] Profile Based Access Control Model in Cloud Computing Environment 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
- [3] Data Security Access Control Model of Cloud Computing 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
- [4] Retraction Note: An identity authentication scheme based on cloud computing environment Multimedia Tools and Applications, 2022, 81 : 44525 - 44525
- [5] RETRACTED ARTICLE: An identity authentication scheme based on cloud computing environment Multimedia Tools and Applications, 2018, 77 : 4283 - 4294
- [6] Survey on access control model in cloud computing environment 2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
- [7] A kind of Identity Authentication under Cloud Computing Environment 2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 12 - 15
- [9] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
- [10] Identity-Based Authentication for Cloud Computing CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166