4.3 Article

Dynamic permission access control model based on privacy protection

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Boosting training for PDF malware classifier via active learning

Yuanzhang Li et al.

Summary: This paper introduces a novel PDF malware detection method using active learning to boost training, aiming to reduce the size of training set while maintaining performance. The method effectively explains the meaning of uncertain samples and uses mutual agreement analysis to choose uncertain samples. By retraining the detector according to the ground truth of uncertain samples, the model achieves the same performance as traditional model with only a fraction of the training samples.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Group key agreement protocol among terminals of the intelligent information system for mobile edge computing

Qikun Zhang et al.

Summary: The paper proposes an asymmetric GKA protocol (GKA-IIS-MEC) for terminals of IIS in a mobile edge computing (MEC) network to address resource constraints of mobile devices. By utilizing asymmetric GKA, the protocol establishes secure group communication mechanisms, migrates computation and communication loads to edge nodes, and provides members with the ability to verify the correctness of group session keys. The proposed protocol is proven to resist negative attacks and exhibits higher efficiency in terms of time cost, communication consumption, and computation consumption compared to existing works.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

A group key agreement protocol for intelligent internet of things system

Qikun Zhang et al.

Summary: The application of intelligent computing in Internet of Things (IoTs) enhances the intelligence and efficiency of various IoTs systems, and secure communication among intelligent terminals can be ensured through group key agreement (GKA).

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things

Qikun Zhang et al.

Summary: This paper proposes a data security sharing model based on privacy protection (DSS-PP) for blockchain-enabled IIoT, with advantages in identity authentication protection, reducing blockchain storage load, and tracing illegal access. Through performance analysis, DSS-PP outperforms the referred works.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing

Xuanmei Qin et al.

Summary: The paper proposes a Blockchain-based Multi-authority Access Control scheme called BMAC, which utilizes Shamir secret sharing scheme and permissioned blockchain (Hyperledger Fabric) to jointly manage user attributes by multiple authorities, reducing the risk of single point of failure and lowering the computation and communication overhead on the data user side.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Computer Science, Artificial Intelligence

Hybrid sequence-based Android malware detection using natural language processing

Nan Zhang et al.

Summary: Researchers studied Android malware detection methods and proposed a sequence-based hybrid detection method. By serializing static opcode and dynamic system call sequences, a CNN-BiLSTM-Attention classifier was built. Experimental results demonstrated the effectiveness and flexibility of this method across various experimental settings.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Opponent portrait for multiagent reinforcement learning in competitive environment

Yuxi Ma et al.

Summary: This study introduces a new method for opponent's policy explanation and intention inference based on the behavioral portrait of the opponent. By training the agent and opponent in a competitive environment and collecting opponent's behavioral data, a knowledge graph of opponent's behavior is built to help the agent infer opponent's intentions.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Information Systems

TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain

Lifeng Guo et al.

Summary: This paper proposes an efficient traceable attribute-based encryption with dynamic access control (TABE-DAC) scheme based on blockchain for fine-grained sharing of encrypted private data on cloud. The proposed scheme supports traceability for malicious users and enables dynamic access control, while ensuring data security.

IEEE ACCESS (2021)

Article Computer Science, Artificial Intelligence

Analyzing host security using D-S evidence theory and multisource information fusion

Yuanzhang Li et al.

Summary: The paper proposes a host security analysis method based on the D-S evidence theory, utilizing multiple models for multisource information fusion, which effectively enhances the host's security protection.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Information Systems

Efficient Decentralized Attribute Based Access Control for Mobile Clouds

Sourya Joyee De et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)

Review Computer Science, Information Systems

An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud

Hao Li et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2020)

Article Computer Science, Information Systems

An Attribute-Based Collaborative Access Control Scheme Using Blockchain for IoT Devices

Yan Zhang et al.

ELECTRONICS (2020)

Article Chemistry, Multidisciplinary

Data Sharing System Integrating Access Control Mechanism using Blockchain-Based Smart Contracts for IoT Devices

Tanzeela Sultana et al.

APPLIED SCIENCES-BASEL (2020)

Article Health Care Sciences & Services

Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare

Saurabh Rana et al.

JOURNAL OF MEDICAL SYSTEMS (2020)

Article Engineering, Electrical & Electronic

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain

Sheng Gao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Theory & Methods

Anonymous decentralized attribute-based access control for cloud-assisted IoT

Hassan Nasiraee et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Smart Contract-Based Access Control for the Internet of Things

Yuanyu Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage

Voundi Koe Arthur Sandor et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

Fine-grained data access control with attribute-hiding policy for cloud-based IoT

Jialu Hao et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Theory & Methods

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT

Hongyang Yan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens

Yan Zhu et al.

IEEE TRANSACTIONS ON RELIABILITY (2019)

Proceedings Paper Automation & Control Systems

Distributed Access Control with Outsourced Computation in Fog Computing

Qihua Wang et al.

PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019) (2019)

Article Computer Science, Information Systems

Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability

Zhenhua Liu et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT

Sheng Ding et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

EACMS: Emergency Access Control Management System for Personal Health Record Based on Blockchain

Ahmed Raza Rajput et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage

Hong Zhong et al.

SOFT COMPUTING (2018)

Article Computer Science, Theory & Methods

Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry

Meikang Qiu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems

Shangping Wang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Yinghui Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

Revocable attribute-based access control in mutli-autority systems

Youcef Imine et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT

Yunru Zhang et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Proceedings Paper Computer Science, Information Systems

BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

Ronghua Xu et al.

IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY (2018)