Author:
Chen Hsing-Chung,Wang Shiuh-Jeng,Wen Jyh-Horng,Huang Yung-Fa,Chen Chung-Wei
Subject
Computer Networks and Communications
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Location-aware IT system security using IoT in multizone;Proceedings of the 28th Annual International Conference on Mobile Computing And Networking;2022-10-14
2. Enhancing user access information with spatial data;Journal of Information and Optimization Sciences;2019-02-17
3. Toward Implementing Spatio-Temporal RBAC Extensions;Information Systems Security;2019
4. A Survey of Role Mining;ACM Computing Surveys;2016-05-02
5. A trusted user-to-role and role-to-key access control scheme;Soft Computing;2015-05-31