An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key.
Jiaoli ShiChuanhe HuangJing WangKai HeJinhai WangPublished in: ICA3PP (1) (2014)
Keyphrases
- control scheme
- closed loop
- access control
- control system
- control strategy
- dynamic model
- predictive control
- control law
- robot manipulators
- fuzzy controller
- control loop
- controller design
- robotic manipulator
- pid controller
- adaptive neural control
- feedback controller
- neural model
- pid control
- cloud computing
- position control
- control method
- numerical simulations
- real time
- experimental data
- mathematical model
- fuzzy logic