Author:
Xu Yang,Zeng Quanrun,Wang Guojun,Zhang Cheng,Ren Ju,Zhang Yaoxue
Publisher
Springer International Publishing
Reference29 articles.
1. Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29(1), 84–106 (2013)
2. Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.B.: A survey on mobile edge computing: the communication perspective. IEEE Commun. Surv. Tutor. 19(4), 2322–2358 (2017)
3. Zhang, Y., Guo, K., Ren, J., Wang, J., Chen, J.: Transparent computing: a promising network computing paradigm. Comput. Sci. Eng. 19(1), 7–20 (2017)
4. Lindqvist, H.: Mandatory access control. Master’s thesis, Umea University, Sweden (2006)
5. Li, N.: Discretionary access control. In: IEEE Symposium on Security & Privacy, vol. 13, pp. 96–109. IEEE (2011)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Forward and Backward Private Searchable Encryption with Fine-grained Access Control;2023 2nd International Conference on Cloud Computing, Big Data Application and Software Engineering (CBASE);2023-11-03
2. Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services;Proceedings of the 28th ACM Symposium on Access Control Models and Technologies;2023-05-24
3. A systematic literature review for authorization and access control: definitions, strategies and models;International Journal of Web Information Systems;2022-08-15
4. PICO;Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing;2022-04-25
5. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction;Sensors;2021-07-28