[1] |
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang.
Multi-authority Access Control Scheme in Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878.
|
[2] |
WANG Yonggui, XU Shanshan, XIAO Chenglong.
Research on Wireless City Community Detection: Using Improved Association Rules to Achieve Community Detection Algorithm on Spark
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1582-1592.
|
[3] |
XU Meng, BAO Anping, LV Zhanshan.
Research on Access Control for Cloud Storage by Improved ABE
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 437-445.
|
[4] |
TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao.
Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729.
|
[5] |
ZHAI Zhinian, LU Yahui, YU Fahong, GAO Huimin.
Backtracking Tree-Decomposition Method with Complete Independence for Workflow Satisfiability Decision (≠)
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(12): 2021-2032.
|
[6] |
WANG Cong, LI Ruixuan, GU Xiwu, TANG Junwei.
Approach of Detecting and Resolving XACML-Based Policy Conflicts
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(1): 1-16.
|
[7] |
LI Han, ZHENG Shang, CHEN Feng.
Research on Role Engineering of Legacy System
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(12): 1931-1940.
|
[8] |
GAO Hanqing, QIN Xiaolin, SHI Wenhao.
Purpose and Context Reasoning Based Access Control Model on Databases
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(9): 1229-1239.
|
[9] |
JIANG Nan, HE Yanxiang, ZHANG Xiaotong, LIU RUI1, SHEN Yunfei.
Formal Analysis and Proof of Java Security Mechanisms
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(11): 1501-1511.
|
[10] |
SHI Wenhao, JIANG Guohua, QIN Xiaolin, WANG Sheng.
Access Control Model Research for HDFS Based on User Trust Value
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(1): 25-35.
|
[11] |
HUO Jiantong, LI Yunchun, YANG Xiumei.
Feasibility Research on Distributed Mandatory Access Control for HPC Cluster
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(5): 543-549.
|
[12] |
DOU Wenyang, WANG Xiaoming, ZHANG Lichen.
Termination Analysis for Active Fuzzy Access Control Rules Set
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(3): 193-208.
|
[13] |
LV Zhiquan, ZHANG Min, FENG Dengguo.
Cryptographic Access Control Scheme for Cloud Storage
[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(9): 835-844.
|
[14] |
ZHOU Conghua, LIU Zhifeng, WU Hailing, CHEN Song.
Syntactic Information Flow Analysis Based on Nontransitive Security Policy
[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(2): 179-192.
|
[15] |
LANG Bo, GAO Hao, CHEN Kai.
Trust Delegation and Discovery Method
[J]. Journal of Frontiers of Computer Science and Technology, 2011, 5(11): 987-998.
|