Zobrazeno 1 - 10
of 154
pro vyhledávání: '"Xuehui DU"'
Publikováno v:
网络与信息安全学报, Vol 10, Pp 58-78 (2024)
Dynamic access control model is the theoretical basis for constructing a dynamic access control system for big data.However, most existing access control models can only fulfill dynamic access control in a single scenario and are unable to adapt to a
Externí odkaz:
https://doaj.org/article/5bc61626058f4b4ba10b70cda953557c
Publikováno v:
网络与信息安全学报, Vol 9, Pp 92-105 (2023)
With the unprecedented growth in the speed of data generation and circulation in the era of big data, the emergence of blockchain technology provides a new solution for data authenticity verification.However, with the increasing demand for data flow
Externí odkaz:
https://doaj.org/article/0837ecf8403f430cb8fd641b7b4614b2
Publikováno v:
PLoS ONE, Vol 19, Iss 7, p e0307686 (2024)
To ensure optimal use of images while preserving privacy, it is necessary to partition the shared image into public and private areas, with public areas being openly accessible and private areas being shared in a controlled and privacy-preserving man
Externí odkaz:
https://doaj.org/article/4c95ac67a0744cf9b5f0f96ec9163d90
Publikováno v:
IEEE Access, Vol 11, Pp 80806-80821 (2023)
Data provenance is an effective approach for data security supervision. In the distributed, multi-user, and multi-layer big data system, only the provenance generation method, which leverages the information logged at both application and operating s
Externí odkaz:
https://doaj.org/article/f2dc6d0dd17a4602906753b0c32982cb
Publikováno v:
网络与信息安全学报, Vol 8, Pp 40-55 (2022)
With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Ba
Externí odkaz:
https://doaj.org/article/770fdea96a82498b85bba2142935c4c8
Publikováno v:
Frontiers in Neurorobotics, Vol 17 (2023)
Deep neural networks (DNNs) have been shown to be susceptible to critical vulnerabilities when attacked by adversarial samples. This has prompted the development of attack and defense strategies similar to those used in cyberspace security. The depen
Externí odkaz:
https://doaj.org/article/5d82405de598496892129afbd14f012c
Publikováno v:
网络与信息安全学报, Vol 8, Pp 123-133 (2022)
To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockcha
Externí odkaz:
https://doaj.org/article/5fd71f9a2d99443a88e8c5fe3d62cdba
Publikováno v:
网络与信息安全学报, Vol 7, Pp 68-87 (2021)
Blockchain technology has the features of decentralization, high credibility, non-tampering and traceability, which can address the trust problem in traditional access control technology.Based on the implementation with blockchain, the unique advanta
Externí odkaz:
https://doaj.org/article/af41780f4190430e929df5d8d8eafe2c
Publikováno v:
网络与信息安全学报, Vol 7, Pp 113-125 (2021)
A blockchain-based data integrity multi-party high-efficiency audit mechanism (MBE-ADI) for the big data environment was proposed.A hybrid Merkle DAG structure based on data domain was built to organize data, and realized the simultaneous verificatio
Externí odkaz:
https://doaj.org/article/c286ed6874784ec095517c0e369395de
Publikováno v:
网络与信息安全学报, Vol 7, Pp 156-168 (2021)
Android privacy leak problem is becoming more and more serious.Information flow analysis is a main method to find privacy leak.Traditional information flow analysis methods mainly focus on single accessibility analysis, which is difficult to analyze
Externí odkaz:
https://doaj.org/article/947ba7479f0846de8bbce79849d7856d