Top results
decentralizing multi-authority attribute-based access control scheme with fully hidden policy leyou zhang1, juan ren1,2, li kang1, and baocang wang3,4 (corresponding author:
zhenghao xin 1 , liang liu 1,* and gerhard hancke 2 1 college of computer science and technology, nanjing university of aeronautics and astronautics, no. 29 yudao street,
slide 1 scalable and secure sharing of personal health records in cloud computing using attribute based encryption by shreyank m. byadagi email:[email protected] agenda:…
scalable lagrangian-based attribute space projection for multivariate unsteady flow data hanqi guo 1,2 fan hong 1 qingya shu 1 jiang zhang 1,2 ∗ jian huang 3 † xiaoru…
a multiple-policy supported attribute-based access control architecture within large-scale device collaboration systems feng liang state key laboratory of software development…
received december 1, 2017, accepted january 21, 2018, date of publication february 5, 2018, date of current version march 13, 2018. digital object identifier 10.1109/access.2018.2800288
element attribute documentation msrfmea v2.1.2 rc4 sl (single language) msr medoc, bernhard weichel, robert bosch gmbh element attribute documentation msrfmea-eadoc page:…
supporting attribute-based access control in authorization and authentication infrastructures with ontologies torsten priebe capgemini consulting Österreich ag vienna austria…
attribute-based access control models and implementation in cloud infrastructure as a service approved by supervising committee: ravi sandhu, ph.d., co-chair ram krishnan,…
oracle access management complete, integrated, scalable access management solution o r a c l e w h i t e p a p e r | m a y 2 0 1 5 oracle access management disclaimer the…
ac-825ip advanced scalable networked access platform the ac-825ip is a 6-door (4 wiegand format & 2 osdp readers) networked access controller suitable for a medium-scale
nist special publication 800-205 attribute considerations for access control systems vincent c hu david f ferraiolo d richard kuhn this publication is available free of charge…
attribute-based access control attributes are customized network objects for use in your configuration you can define and use them in cisco asa configurations to filter traffic…
available online at wwwijcsmccom international journal of computer science and mobile computing a monthly journal of computer science and information technology issn 2320–088x…
received may 13, 2018, accepted may 29, 2018, date of publication june 6, 2018, date of current version june 20, 2018. digital object identifier 10.1109access.2018.2844373…
using attribute embedded inverted indexing for the content based face image extraction reshma s hebbar student, vtu rc mysore [email protected] abstract—face image…
attribute-based encryption with non-monotonic access structures brent waters sri international amit sahai ucla rafail ostrovsky ucla server mediated access control access…
attribute-based encryption with non-monotonic access structures brent waters sri international amit sahai ucla rafail ostrovsky ucla server mediated access control access…
abac-cc: attribute-based access control and communication control for internet of thingssmriti bhatt department of computing and cyber security, texas a&m university-san
microsoft word - z-vc674-04secure fine-grained attribute-based access control with hidden policy for electronic health record system sai ji1, xin jin1, jin-feng lai3, jian