[1] |
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang.
Multi-authority Access Control Scheme in Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878.
|
[2] |
WANG Yonggui, XU Shanshan, XIAO Chenglong.
Research on Wireless City Community Detection: Using Improved Association Rules to Achieve Community Detection Algorithm on Spark
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1582-1592.
|
[3] |
TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao.
Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729.
|
[4] |
ZHAI Zhinian, LU Yahui, YU Fahong, GAO Huimin.
Backtracking Tree-Decomposition Method with Complete Independence for Workflow Satisfiability Decision (≠)
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(12): 2021-2032.
|
[5] |
WANG Cong, LI Ruixuan, GU Xiwu, TANG Junwei.
Approach of Detecting and Resolving XACML-Based Policy Conflicts
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(1): 1-16.
|
[6] |
LI Han, ZHENG Shang, CHEN Feng.
Research on Role Engineering of Legacy System
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(12): 1931-1940.
|
[7] |
REN Lu, YIN Qing, CHANG Rui, JIANG Hang.
Research Progress on Access Control Mechanisms for ARM-Android Platforms
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(10): 1545-1556.
|
[8] |
CHENG Bin, LI Dali, XU Chuanfu, LIU Wei, WANG Guangxue, DENG Xiaogang.
Research on Jacobian-Free Newton-Krylov Method for High-Order CFD Applications and Its Parallel Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(1): 61-69.
|
[9] |
GAO Hanqing, QIN Xiaolin, SHI Wenhao.
Purpose and Context Reasoning Based Access Control Model on Databases
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(9): 1229-1239.
|
[10] |
JIANG Nan, HE Yanxiang, ZHANG Xiaotong, LIU RUI1, SHEN Yunfei.
Formal Analysis and Proof of Java Security Mechanisms
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(11): 1501-1511.
|
[11] |
SHI Wenhao, JIANG Guohua, QIN Xiaolin, WANG Sheng.
Access Control Model Research for HDFS Based on User Trust Value
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(1): 25-35.
|
[12] |
YU Jiong, LIAO Bin, ZHANG Tao, SUN Hua, GUO Binglei, YANG Xingyao.
A Survey on Energy-Efficient Cloud Storage System
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(9): 1025-1040.
|
[13] |
HUO Jiantong, LI Yunchun, YANG Xiumei.
Feasibility Research on Distributed Mandatory Access Control for HPC Cluster
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(5): 543-549.
|
[14] |
ZHANG Bang, WANG Xingwei, HUANG Min.
Intelligent Multiple Data Replica Placement Scheme for Cloud Storage
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(10): 1177-1186.
|
[15] |
DOU Wenyang, WANG Xiaoming, ZHANG Lichen.
Termination Analysis for Active Fuzzy Access Control Rules Set
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(3): 193-208.
|