Sign in

A trusted user-to-role and role-to-key access control scheme.

Hsing-Chung Chen
Published in: Soft Comput. (2016)
Keyphrases
  • control scheme
  • dynamic model
  • closed loop
  • real time
  • control system
  • back propagation
  • input output
  • control strategy