Sign Up to like & get
recommendations!
2
Published in 2022 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.22904
Abstract: While cloud computing services such as cloud storage are fairly mature, it remains challenging to design efficient and secure cryptographic schemes to facilitate fine‐grained access control and achieve other features. For example, existing ciphertext‐policy attribute‐based…
read more here.
Keywords:
blockchain based;
control times;
based access;
access control ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Circuits, Systems, and Signal Processing"
DOI: 10.1007/s00034-018-0893-6
Abstract: AbstractIn this paper, a hardware implementation of a data hiding technique is proposed for efficient quality access control of images using lifting-based discrete wavelet transformation (DWT). Host image is decomposed into n-level wavelet tiles. A…
read more here.
Keywords:
scheme;
implementation;
quality;
access control ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Personal and Ubiquitous Computing"
DOI: 10.1007/s00779-017-1089-y
Abstract: With the explosive growth of smart phones in recent years, QR code is becoming more and more popular. This work presents a new electronic access control system for smart building based on QR code. The…
read more here.
Keywords:
aesthetic code;
access control;
control system;
code ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Applied Intelligence"
DOI: 10.1007/s10489-017-1064-3
Abstract: The purpose based access control model has been proposed recently to restrict the access to the sensitive data which are out of control of their owner. This model can be enforced by ensuring that the…
read more here.
Keywords:
model;
access control;
control model;
access ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-0863-y
Abstract: WSN-integrated cloud computing (WCC) has become a promising cloud service architecture, in which sensors and mobile devices are utilized as the data collecting and processing nodes for the cloud service model, while cloud servers can…
read more here.
Keywords:
data access;
wsn;
fine grained;
access control ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Cluster Computing"
DOI: 10.1007/s10586-020-03196-x
Abstract: As a pioneering surge of ICT technologies, offering computing resources on-demand, the exceptional evolution of Cloud computing has not gone unnoticed by the IT world. At the same time, security stands as a most prior…
read more here.
Keywords:
cloud;
cloud computing;
access control;
computing environment ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Information Systems Frontiers"
DOI: 10.1007/s10796-021-10167-z
Abstract: Over the past few years, several efforts have been made to enable specification and enforcement of flexible and dynamic access control policies using traditional access control (such as role based access control (RBAC), etc.) and…
read more here.
Keywords:
heterogeneous access;
control policies;
access;
administrative model ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Medical Systems"
DOI: 10.1007/s10916-019-1467-2
Abstract: As a consequence of the epidemiological transition towards non-communicable diseases, integrated care approaches are required, not solely focused on medical purposes, but also on a range of essential activities for the maintenance of the individuals’…
read more here.
Keywords:
control policies;
access control;
definition access;
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-07923-4
Abstract: The patient and healthcare professionals use the Electronic Healthcare System (EHS) for accessing medical records from the remote locations via the Internet. The emerging healthcare system has several advantages such as better management of the…
read more here.
Keywords:
healthcare;
healthcare system;
trust;
access control ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Multidimensional Systems and Signal Processing"
DOI: 10.1007/s11045-019-00650-x
Abstract: Dither modulation is a well-known data hiding technique for the quality access control of the digital image. Sometimes, quality access control demands real-time hardware implementation to achieve low-power consumption, high-speed, and real time processing with…
read more here.
Keywords:
scheme;
access control;
quality access;
Sign Up to like & get
recommendations!
0
Published in 2019 at "Telecommunication Systems"
DOI: 10.1007/s11235-018-00542-8
Abstract: Vehicular ad hoc network (VANET) is an emerging and promising technology, which allows vehicles while moving on the road to communicate and share resources. These resources are aimed at improving traffic safety and providing comfort…
read more here.
Keywords:
vehicular hoc;
time;
medium access;
access ... See more keywords