Trusted network authorization scheme based on cloud model

被引:0
|
作者
Wu, Kun [1 ]
Li, Chuyan [2 ]
机构
[1] School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] Department of Aviation Theory, Aviation University of Air Force, Changchun 130022, China
关键词
D O I
10.4156/jcit.vol7.issue3.21
中图分类号
学科分类号
摘要
引用
收藏
页码:183 / 191
相关论文
共 50 条
  • [1] A trusted computing model based on code authorization
    Wei, Guoheng
    Zhou, Xueguang
    Zhang, Huanguo
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
  • [2] Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp
    Zhai, Guang-hui
    Li, Juan
    Song, Cheng
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 327 - +
  • [3] A Trust Network Driven User Authorization Scheme for Social Cloud
    Susan, Stephy P.
    Sarath, Greeshma
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 533 - 542
  • [4] A Trusted Authorization Scheme for E-commerce Systems
    Hu Ronglei
    Duan Xiaoyi
    Li Zhaobin
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [5] An Improved Authorization System Base on Trusted Network
    Gao, Yonghu
    Zhang, Xiaozhe
    Gao, Xianming
    Ma, Shicong
    Meng, Xiangbo
    2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2013, : 327 - 330
  • [6] A trusted behaviour measurement scheme based on feedback and control in trusted network
    Zhuang J.
    Zhao X.
    Gong B.
    Zhan J.
    International Journal of Wireless and Mobile Computing, 2021, 20 (02) : 99 - 106
  • [7] A Cloud Data Access Authorization Update Scheme Based on Blockchain
    Lei, Yanfang
    Jia, Zhijuan
    Yang, Yanyan
    Cheng, Yage
    Fu, Junjun
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 33 - 38
  • [8] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [9] PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT
    Su, Mang
    Zhou, Bo
    Fu, Anmin
    Yu, Yan
    Zhang, Gongxuan
    INFORMATION SCIENCES, 2020, 527 (533-547) : 533 - 547
  • [10] A Trusted Connection Based Scheme for Ad Hoc Network
    Xie, Weichao
    Wang, Jian
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 34 - 38