Game analysis of access control based on user behavior trust

Y Wang, L Tian, Z Chen - Information, 2019 - mdpi.com
Due to the dynamics and uncertainty of the current network environment, access control is
one of the most important factors in guaranteeing network information security. How to …

Non-zero-sum cooperative access control game model with user trust and permission risk

N Helil, A Halik, K Rahman - Applied Mathematics and Computation, 2017 - Elsevier
In access control, there exists a game between an application system and its user, in which
both the system and the user try to maximize their own utility. Establishing a reasonable …

An object-centric multi-source heterogeneous data fusion scheme

H Jiming, S Wei - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
The rapid development of Internet services has increased the personal data we generate on
the Internet. However, these personal data are collected and owned by the service provider …

数据自治开放的软件开发和运行环境

吴毅坚, 陈士壮, 葛佳丽, 赵文耘 - 大数据, 2018 - infocomm-journal.com
摘要数据自治开放是数据开放的一种新形式, 能保护数据拥有者的合法权益.
数据自治开放这一新的数据开放模式要求软件开发和运行环境能从应用的需求描述 …

Implementation of analysis of data storage and retrieval using Rainbow technology

S Vijitha, R Priyanka, G Sowmiya… - 2016 International …, 2016 - ieeexplore.ieee.org
In the present day context, users are making use of public storage services in the cloud and
local storage devices such as CD's and DVD's. Fortunately, with the advancement in the …