您当前的位置:
首页 >
文章列表页 >
Access control security model based on behavior in cloud computing environment
Papers | 更新时间:2024-06-05
    • Access control security model based on behavior in cloud computing environment

    • Journal on Communications   Vol. 33, Issue 3, Pages: 59-66(2012)
    • DOI:1000-436X(2012)03-0059-08    

      CLC: TP393
    • Online First:2012-03

      Published:25 March 2012

    移动端阅览

  • Guo-yuan LIN, Shan HE, Hao HUANG, et al. Access control security model based on behavior in cloud computing environment[J]. Journal on Communications, 2012, 33(3): 59-66. DOI: 1000-436X(2012)03-0059-08.

  •  
  •  

0

Views

518

下载量

27

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research of duality and multi-level security model based on intransitive noninterference theory
Access control model based on trusted computing for integrated avionics system
Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment
M-RSF: a multilevel feedback queue task scheduling mechanism for Unikernel
Scheduling framework based on reinforcement learning in online-offline colocated cloud environment

Related Author

LIU Wei-peng1
ZHANG Xing2
CUI Xi-ning1
2
SHEN Yu-long1
MA Jian-feng1
CAO Xiaogang
LI Fenghua

Related Institution

State Key Laboratory of Information Security,Graduate School of Chinese Academy of Sciences
Electronic Technology Institute of PLA Information Engineering University
School of Computer Science and Technology,Xidian University
Aeronautics Computing Technology Research Institute
Institute of Information Engineering, Chinese Academy of Sciences
0