Secure and Verifiable Data Access Control Scheme With Policy Update and Computation Outsourcing for Edge Computing.
Yue GuanSongtao GuoPan LiYuanyuan YangPublished in: ICPADS (2020)
Keyphrases
- data access
- control scheme
- closed loop
- data management
- control strategy
- predictive control
- control system
- dynamic model
- data confidentiality
- data sharing
- database applications
- robot manipulators
- control loop
- data transfer
- control law
- data objects
- data providers
- fuzzy controller
- pid controller
- neural network controller
- position control
- visual basic
- machine learning
- data security
- adaptive neural control
- sql server
- information technology
- metadata
- control method
- memory access
- data availability
- data replication
- control algorithm
- sufficient conditions
- object oriented
- data warehouse
- database systems
- information systems