Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Shanbiao Wang"'
Publikováno v:
2021 International Conference on Applications and Techniques in Cyber Intelligence ISBN: 9783030791995
ATCI (1)
ATCI (1)
The description of cyber threat information is the basis of threat intelligence sharing. Focusing on the description of threat information, this paper analyzes the threat intelligence standards at home and abroad, summarizes the description and analy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c70528e31c162f294c6f89876e61fb91
https://doi.org/10.1007/978-3-030-79200-8_50
https://doi.org/10.1007/978-3-030-79200-8_50
Publikováno v:
IEEE Transactions on Information Forensics and Security. 8:2138-2153
Even though role-based access control (RBAC) can tremendously help us to minimize the complexity in administering users, it still needs to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC mod
Publikováno v:
International Journal of Cooperative Information Systems. 21:165-197
A hybrid cloud is a cloud computing environment in which an organization provides and manages some internal resources and has others provided externally. However, this new environment could bring irretrievable losses to the clients due to a lack of i
Publikováno v:
GLOBECOM
Numerous cryptographic techniques have been developed to be used on mobile devices for various security and privacy protections. However, these cryptographic primitives, working under different mathematical assumptions, tend to become more and more c
Publikováno v:
ICDCS Workshops
The ability to efficiently retrieve data in their encrypted form is important for the cloud to become a truly secure and practical data sharing platform. Although this field has attracted tremendous research attention in the past a few years, most ex
Publikováno v:
INFOCOM
Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integrate data access policies within the encrypted data. However, little work
Publikováno v:
2012 IEEE Global Communications Conference (GLOBECOM); 2012, p949-954, 6p