Intelligent Computing Making Access Control More Secure: From Cipher to Trust.
Tian WangWeidong FangMufan NiXiaoliang YangWei ChenWentao ChenWuxiong ZhangPublished in: ICIC (8) (2024)
Keyphrases
- access control
- intelligent computing
- trust relationships
- access control models
- data security
- security mechanisms
- identity management
- security requirements
- computational intelligence
- security architecture
- access control mechanism
- security model
- unauthorized access
- rbac model
- security issues
- security policies
- usage control
- xml access control
- evolutionary computing
- book presents
- role based access control
- dynamic access control
- digital rights management
- access control policies
- data protection
- trusted computing
- access control systems
- authentication and access control
- trust model
- security management
- privacy aware
- multi domain
- resource constrained
- access rights
- decision making
- artificial intelligence
- security analysis
- privacy concerns
- genetic programming
- protection schemes
- genetic algorithm