Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Rongna XIE"'
Publikováno v:
网络与信息安全学报, Vol 9, Pp 21-32 (2023)
To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or confli
Externí odkaz:
https://doaj.org/article/5d53ea0a66224843a5c1b60a34fc34c9
Publikováno v:
网络与信息安全学报, Vol 8, Pp 84-91 (2022)
Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which
Externí odkaz:
https://doaj.org/article/a2f2d4dcd67645079f5b9711e4c18d67
Publikováno v:
网络与信息安全学报, Vol 7, Pp 123-131 (2021)
Aiming at the problem of inability to extend control over the data published by users in social networks, an extended access mechanism based on privacy labels was proposed.This mechanism granted users and data different types of labels based on the n
Externí odkaz:
https://doaj.org/article/ad642c3a476a48a29cb34a7d54247045
Publikováno v:
Tongxin xuebao, Vol 41, Pp 82-93 (2020)
To improve the transparency and traceability of access control, a blockchain-based access control mechanism for data traceability and provenance was proposed.The proposed access control policy was transferred to the smart contract and deployed on the
Externí odkaz:
https://doaj.org/article/893a18a035de46a29d79d679c2808239
Publikováno v:
Tongxin xuebao, Vol 41, Pp 112-122 (2020)
Aiming at the severe challenges of access control policy redundancy and conflict detection,the efficiency of access control policy evaluation in complex network environment,an attribute-based lightweight reconfigurable access control policy was propo
Externí odkaz:
https://doaj.org/article/7e8d5ca4d2344fb69603aeaa1ccfdb25
Publikováno v:
网络与信息安全学报, Vol 5, Pp 105-112 (2019)
With the rapid development of network and information technology,paperless and electronic have become the development trend of today's economic life.As a consumption certificate,electronic invoices have become more and more demanding in e-commerce.Th
Externí odkaz:
https://doaj.org/article/22d4bb3a66f8478aa57f0389f5a9598c
Publikováno v:
Tongxin xuebao, Vol 40, Pp 67-76 (2019)
Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constr
Externí odkaz:
https://doaj.org/article/d015f8ff46964b41b5abdfff330204a0
Publikováno v:
2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC).
Publikováno v:
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019) ISBN: 9789811514678
DPTA
DPTA
With the increase of information resources, resources are uploaded to different cloud services in different domains. In order to facilitate cross-domain access, it is necessary to grant access authority to the subject before cross-domain access. Ther
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6c6578082a1a12829613ca4ffaf8a0ee
https://doi.org/10.1007/978-981-15-1468-5_103
https://doi.org/10.1007/978-981-15-1468-5_103
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
The development of online social networks allows users to communicate with each other and share their resources when and where. However, in the process of data dissemination, the user loses control of the private information if the user shares resour