A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management.
Conghao RuanChunqiang HuRuifeng ZhaoZewei LiuHongyu HuangJiguo YuPublished in: IEEE Internet Things J. (2023)
Keyphrases
- control scheme
- trust management
- access control
- closed loop
- trust negotiation
- access control policies
- control strategy
- control system
- management system
- trust evaluation
- control law
- dynamic model
- predictive control
- fuzzy controller
- control loop
- trust model
- pid controller
- virtual organization
- robot manipulators
- virtual communities
- controller design
- computing environments
- decision support
- multi agent
- neural network controller
- cooperative
- data security
- control algorithm
- test bed
- distributed systems
- service providers
- expert systems
- fault tolerant control
- peer to peer