Author:
Li Yong,Chen Lu,Li Nige,Lu Ziang,Dai Zaojian,Wu and Fan
Publisher
Springer International Publishing
Reference19 articles.
1. Qian, Z., Elbadry, M., Fan, Y., Yang, Y.: Heracles: scalable, fine-grained access control for internet-of-things in enterprise environments. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 1772–1780 (2018)
2. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. In: Proceedings RBAC, pp. 191–233 (2001)
3. Park, J., Sandhu, R.: Towards usage control models: Beyond traditional access control. In: Proceedings SACMAT, pp. 57–64. Monterey, California, USA (2002)
4. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62–91 (2010)
5. Dammak, M., Senouci, S.M., Messous, M.A., Elhdhili, M.H., Gransart, C.: Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans. Netw. Serv. Manage. 17(3), 1742–1757 (2020)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Zero trust security model: Defining new boundaries to organizational network;Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing;2023-08-03
2. Research and Application of Grid Cloud Service Security Access Control Technology Based on Zero Trust Model;2023 International Conference on Data Science and Network Security (ICDSNS);2023-07-28