×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉轻工大学 [9]
内容类型
会议论文 [6]
期刊论文 [3]
发表日期
2014 [1]
2013 [1]
2012 [1]
2009 [5]
2005 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
专题:武汉轻工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Approaches to grey state modeling and modal control of complicated systems
会议论文
2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2014, Wuhan, Hubei, China, October 18, 2014 - October 19, 2014
作者:
Chen, Weizhen*
;
Zhou, Long
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/27
Complicated systems
Grey system
Grey state model
Modal Control
Research on security problems in wireless sensor networks
会议论文
2013 2nd International Conference on Measurement, Instrumentation and Automation, ICMIA 2013, Guilin, China, April 23, 2013 - April 24, 2013
作者:
Liu, Wentao*
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/27
wireless sensor networks
security
intrusion detection system
Research on Multi-policy Supporting System Security Based on Behavior and State Control
会议论文
International Conference on Intelligence Science and Information Engineering (ISIE 2012), Lushan, PEOPLES R CHINA, AUG 25-26, 2012
作者:
Wang Jing*
;
Lin Zhi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/27
multi-policy supporting
state control
behavior control
security policy
A Security Log Based Trust Negotiation Model
期刊论文
Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009, 2009, 卷号: 2, 期号: 2, 页码: 517-520
作者:
Yuan, Cao*
;
Li, Yaqin
;
Yan, Jun
;
Liao, Zhengsong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/27
Trust Negotiation
Digital Credential
Authorization
Security log
Access Control Policy
A Novelty Approach for Checking Consistency of Security Policy
会议论文
International Forum on Information Technology and Applications (IFITA 2009), Chengdu, PEOPLES R CHINA, MAY 15-17, 2009
作者:
Liu Changhua*
;
Li Yaqin
;
Liao Zhensong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/27
ATN
access control policy
Hiding policy
checking policy
policy consistency
Research on Policy-based Access Control Model
会议论文
International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, PEOPLES R CHINA, APR 25-26, 2009
作者:
Lin Zhi*
;
Wang Jing
;
Chen Xiao-su
;
Jia Lian-xing
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/27
access control model
attribute
policy
decision
multi-policy supporting
Policy-based Behavior Control
会议论文
5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, PEOPLES R CHINA, SEP 24-26, 2009
作者:
Lin Zhi*
;
Wang Jing
;
Jia Lian-xing
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/27
policy
behavior control
security
generality
Application Research of the CAN on Role-Based Access Control
期刊论文
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, 页码: 4668-+
作者:
Qin, Shi-Hong*
;
Zhao, Qing
;
Ge, Zhou
;
Li, Huanhuan
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/27
CAN
role
access control
security
Image watermarking technique based on two-dimensional chaotic stream encryption
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2005, 卷号: 3823, 页码: 817-824
作者:
Hu, Hanping
;
Chen, Yongqiang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/27
©版权所有 ©2017 CSpace - Powered by
CSpace