An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment.
Rui ChangLiehui JiangQing YinLu RenQingfeng LiuPublished in: ICCNS (2016)
Keyphrases
- control scheme
- execution environment
- closed loop
- access control
- control system
- control strategy
- dynamic model
- predictive control
- robot manipulators
- fuzzy controller
- control law
- controller design
- mathematical model
- pid controller
- reinforcement learning
- robotic manipulator
- neural network controller
- metadata
- heat exchanger
- control loop
- distributed systems
- multimedia