Distributed access control for remote user

被引:0
|
作者
Xie, Fangjun
Tang, Changjie
Chen, Anlong
Zhang, Hong
Yuan, Changan
机构
[1] College of Computer Science, Sichuan University, Chengdu 610065, China
[2] College of Physics Science and Technology, Sichuan University, Chengdu 610065, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:37 / 39
相关论文
共 50 条
  • [1] Distributed user access control in sensor networks
    Wang, Haodong
    Li, Qun
    [J]. DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, PROCEEDINGS, 2006, 4026 : 305 - 320
  • [2] Achieving distributed user access control in sensor networks
    Wang, Haodong
    Li, Qun
    [J]. AD HOC NETWORKS, 2012, 10 (03) : 272 - 283
  • [3] Dynamic security for multi-user access control in distributed environment
    Prakash, S. Jaya
    Kumar, K. Varada Raj
    Nedunuri, Deepak
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [4] A novel user authentication and access control scheme for a distributed computer network
    Lee, WB
    Liao, KC
    Hsiao, YH
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 118 - 122
  • [5] Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback
    Huang, Senhua
    Liu, Xin
    Ding, Zhi
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [6] ON THE REGULATION OF USER ROLES IN THE ACCESS CONTROL MODEL FOR REMOTE DATA MANAGEMENT SYSTEM
    Berberyan, L.
    [J]. MATHEMATICA MONTISNIGRI, 2014, 29 : 98 - 103
  • [7] Two integrated schemes of user authentication and access control in a distributed computer network
    Jan, JK
    Tseng, YM
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (06): : 419 - 424
  • [8] Managing user focused access to distributed knowledge
    Studer, R
    Sure, Y
    Volz, R
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2002, 8 (06) : 662 - 672
  • [9] Cryptanalysis and improvement of two access control schemes with user authentication in a distributed computer network
    Lee, NY
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (02) : 386 - 391
  • [10] REMOTE DATABASE ACCESS IN THE DISTRIBUTED COMPUTING ENVIRONMENT
    WONG, J
    MARSHALL, W
    GOODMAN, R
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1994, 24 (04): : 421 - 434