共 21 条
[1]
5G Americas, 2017, LTE Progress Leading to the 5G Massive Internet of Things
[2]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[3]
Enhanced Role-Based Access Control for Cloud Security
[J].
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1,
2015, 324
:837-852
[4]
Cardoza C, 2017, SD TIMES 0125
[5]
Chen H.-C., 2014, J INTERNET SERV INF, V4, P52
[6]
Chen H-C, 2017, P IOTAAS 2017 3 EAI
[7]
Chen HC, 2017, CONSUM COMM NETWORK, P120, DOI 10.1109/CCNC.2017.7983092
[9]
TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks
[J].
IEEE SYSTEMS JOURNAL,
2017, 11 (02)
:449-459
[10]
A trusted user-to-role and role-to-key access control scheme
[J].
SOFT COMPUTING,
2016, 20 (05)
:1721-1733