Author:
Zulkefli Zakiah,Mahinderjit Singh Manmeet
Funder
Universiti Sains Malaysia
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference49 articles.
1. Privacy-preserving personal data operation on mobile cloud - chances and challenges over advanced persistent threat;Au;Fut. Gener. Comput. Syst.,2017
2. Balamurugan, B., Shivitha, N.G., Monisha, V., & Saranya, V. A honey bee behaviour inspired novel attribute-based access control using enhanced bell-lapadula model in cloud computing. 2015. International Conference on Innovation Information in Computing Technologies (ICIICT). pp 1-6.
3. Baumgartner, K., Raiu, C., & Maslennikov, D. Android trojan found in targeted attack. (accessed on 25 September 2016).
4. Location-based access control systems for mobile users: concepts and research directions;Bertino,2011
5. ABAC and RBAC: scalable, flexible, and auditable access management;Coyne;IT Prof.,2013
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献