نتایج جستجو برای: abac

تعداد نتایج: 142  

Journal: :Wuhan University Journal of Natural Sciences 2022

The Energy Internet has generated huge amounts of information on the production devices, transmission and energy consumption devices. leakage data in collection, transmission, storage process will cause serious security problems. existing methods rely traditional access control mechanisms specific network boundary defense mechanisms, which limitations static strategies coarse design. We combine...

Journal: :International Journal of Advanced Computer Science and Applications 2023

Blockchain-based access control mechanisms have garnered significant attention in recent years due to their potential address the security and privacy challenges Internet of Things (IoT) ecosystem. IoT devices generate massive amounts data that are often transmitted cloud-based servers for processing storage. However, these vulnerable attacks unauthorized access, which can lead breaches violati...

2017
Denis Pinkas

This eID scheme built along "privacy by design" principles covers a full range of identification using a single mechanism starting from the use of pseudonyms, followed by a gradual disclosure of some attributes with the consent of the end-user, up to the disclosure of a sufficient number attributes that allows a full identification of an end-user under a given context, again with the consent of...

Journal: :Applied sciences 2023

In the IoT (Internet of Things) environment, existing access control schemes for device resources have some problems, such as poor scalability, high latency, security, and dynamics. Combining advantages permissioned blockchain edge computing, an scheme Internet Things based on computing is proposed. By authenticating user’s identity at edge, reliable response time improved. ABAC (Attribute Base...

Journal: :IEEE Access 2023

The sharing of data is becoming increasingly important for the process and manufacturing industries that are using data-driven models advanced analysis to assess production performance make predictions, e.g., on wear tear. In such environments, access needs be accurately controlled prevent leakage unauthorized users while providing easy manage policies. Data should further shared with outside t...

2015
Navid Pustchi Ravi S. Sandhu

A major barrier to the adoption of cloud Infrastructure-as-aService (IaaS) is collaboration, where multiple tenants engage in collaborative tasks requiring resources to be shared across tenant boundaries. Currently, cloud IaaS providers focus on multi-tenant isolation, and offer limited or no cross-tenant access capabilities in their IaaS APIs. In this paper, we present a novel attribute-based ...

Journal: :Macromolecular Chemistry and Physics 2021

Various (AB)n and (ABAC)n segmented copolymers with hydrophilic hydrophobic segments are processed via melt electrowriting (MEW). Two different composed of bisurea poly(dimethyl siloxane) (PDMS) or poly(propylene oxide)-poly(ethylene oxide)-poly(propylene oxide) (PPO-PEG-PPO) segments, while the amphiphilic consist in combination PDMS PPO-PEG-PPO ratios, explored. All copolymer compositions usi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید