Comprehensive Survey towards Security Authentication Methods for Satellite Communication Systems.
CoRR, March, 2025
A Group-Vehicles Oriented Reputation Assessment Scheme for Edge VANETs.
IEEE Trans. Cloud Comput., 2024
A model transformation based security policy automatic management framework for software-defined networking.
Comput. Secur., 2024
A Practical Runtime Security Policy Transformation Framework for Software Defined Networks.
CoRR, 2023
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data.
IEEE Trans. Serv. Comput., 2022
A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System.
IEEE Trans. Reliab., 2022
SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare.
IEEE Internet Things J., 2022
A user requirements-oriented privacy policy self-adaption scheme in cloud computing.
Frontiers Comput. Sci., 2022
SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition.
CoRR, 2021
A security policy model transformation and verification approach for software defined networking.
Comput. Secur., 2021
SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare.
IEEE Trans. Netw. Serv. Manag., 2020
A topology and risk-aware access control framework for cyber-physical space.
Frontiers Comput. Sci., 2020
SOM-based DDoS Defense Mechanism using SDN for the Internet of Things.
CoRR, 2020
面向大数据的隐私发布暴露检测方法 (Big Data Oriented Privacy Disclosure Detection Method for Information Release).
计算机科学, 2019
Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems.
CoRR, 2019
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification.
Comput. Secur., 2019
Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints.
Proceedings of the Science of Cyber Security - Second International Conference, 2019
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities.
Future Gener. Comput. Syst., 2018
Numerical simulations of migration and coalescence behavior of microvoids driven by diffusion and electric field in solder interconnects.
Microelectron. Reliab., 2017
基于本体概念相似度的软件构件检索方法 (Software Component Retrieval Method Based on Ontology Concept Similarity).
计算机科学, 2017
Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services.
IEEE Access, 2017
Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing.
J. Commun., 2015
Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters.
J. Softw., 2014
Verification of Behavior-aware Privacy Requirements in Web Services Composition.
J. Softw., 2014
The Application of SWRL Based Ontology Inference for Privacy Protection.
J. Softw., 2014
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing.
J. Appl. Math., 2014
Supporting negotiation mechanism privacy authority method in cloud computing.
Knowl. Based Syst., 2013
Self-adaptive semantic web service matching method.
Knowl. Based Syst., 2012