Author of the publication

基于经纪人的多云访问控制模型研究 (Research on Broker Based Multicloud Access Control Model).

, , and . 计算机科学, 46 (11): 123-129 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Semantic Web Techniques to Implement Access Control for Web Service., , , , and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 258-266. Springer, (2010)An improved reversible image watermarking algorithm based on difference expansion., , , , and . IJDSN, (2017)一种基于域知识的协议状态机主动推断算法 (Domain-specific Algorithm of Protocol State Machine Active Inference)., , , , and . 计算机科学, 42 (12): 233-239 (2015)基于经纪人的多云访问控制模型研究 (Research on Broker Based Multicloud Access Control Model)., , and . 计算机科学, 46 (11): 123-129 (2019)ATOS: Adaptive Program Tracing With Online Control Flow Graph Support., , , , , and . IEEE Access, (2019)Adaptive reversible image watermarking algorithm based on DE., , , , and . KSII Trans. Internet Inf. Syst., 11 (3): 1761-1784 (2017)A novel destination prediction attack and corresponding location privacy protection method in geo-social networks., , , , and . IJDSN, (2017)High-speed anomaly traffic detection based on staged frequency domain features., , , , and . J. Inf. Secur. Appl., (September 2023)Icefex: Protocol Format Extraction from IL-based Concolic Execution., , , , , and . KSII Trans. Internet Inf. Syst., 7 (3): 576-599 (2013)Deep learning-based personality recognition from text posts of online social networks., , , , , , , and . Appl. Intell., 48 (11): 4232-4246 (2018)