共 50 条
[42]
Sorting Out Role Based Access Control
[J].
PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14),
2014,
:63-74
[43]
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control
[J].
ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION,
2015,
:141-146
[44]
Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPsec Performance
[J].
SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2017),
2017, 10465
:83-90
[45]
Improving Security and Mobility for Remote Access: A Wireless Sensor Network Case
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES),
2015,
[46]
Efficient and Secure Access Control System Based on Programmable Smart Cards
[J].
2017 40TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP),
2017,
:32-36
[47]
Secure and Privacy Preserving RFID Based Access Control to Smart Buildings
[J].
SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018),
2018, 11342
:146-155
[48]
A Secure Authentication and Access Control Scheme for CoAP-based IoT
[J].
2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT,
2022,
:145-149
[49]
Distributed Trust Based Access Control Architecture for Pervasive Computing
[J].
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009),
2009,
:464-469
[50]
Distributed Access Control on IoT Ledger-based Architecture
[J].
NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM,
2018,