ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Cross-Domain Security Model Based on Internet of Vehicles
EAI/Springer Innovations in Communication and Computing - Intelligent Mobile Service Computing
◽
10.1007/978-3-030-50184-6_1
◽
2020
◽
pp. 1-16
Author(s):
Wei Ou
◽
Meiyan Wei
◽
Qin Yi
◽
Lihong Xiang
Keyword(s):
Security Model
◽
Internet Of Vehicles
◽
Model Based
◽
Cross Domain
Start Chat
Download Full-text
Related Documents
Cited By
References
A Verification Method of Security Model Based on UML and Model Checking
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2009.00699
◽
2009
◽
Vol 32
(4)
◽
pp. 699-708
Author(s):
Liang CHENG
◽
Yang ZHANG
Keyword(s):
Model Checking
◽
Security Model
◽
Verification Method
◽
Model Based
Start Chat
Download Full-text
Cross-domain authorization management model based on two-tier role mapping
Journal of Computer Applications
◽
10.3724/sp.j.1087.2013.02511
◽
2013
◽
Vol 33
(9)
◽
pp. 2511-2515
◽
Cited By ~ 2
Author(s):
Zhiyu REN
◽
Xingyuan CHEN
◽
Dibin SHAN
Keyword(s):
Management Model
◽
Model Based
◽
Cross Domain
◽
Authorization Management
◽
Role Mapping
Start Chat
Download Full-text
Cross-Domain Authentication Model Based on Lattice
2010 WASE International Conference on Information Engineering
◽
10.1109/icie.2010.35
◽
2010
◽
Author(s):
Miao Feng-man
◽
Zhang Qiu-yu
Keyword(s):
Model Based
◽
Cross Domain
Start Chat
Download Full-text
A New Information Security Model Based on Network Service Protection
2009 First International Conference on Information Science and Engineering
◽
10.1109/icise.2009.91
◽
2009
◽
Cited By ~ 1
Author(s):
Wei Li
◽
Dongdong Wu
◽
Hui Lu
Keyword(s):
Information Security
◽
Security Model
◽
Network Service
◽
Model Based
◽
New Information
Start Chat
Download Full-text
The Design Research of Data Security Model Based on Public Cloud
2013 Ninth International Conference on Computational Intelligence and Security
◽
10.1109/cis.2013.133
◽
2013
◽
Cited By ~ 1
Author(s):
Xian Weiquan
◽
Wang Houkui
Keyword(s):
Data Security
◽
Design Research
◽
Security Model
◽
Public Cloud
◽
Model Based
Start Chat
Download Full-text
E-commerce Transaction Information Security Model Based on Big Data Analysis
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43309-3_45
◽
2020
◽
pp. 322-328
Author(s):
Yang Wang
◽
Meng Tu
◽
Jiejie Cui
Keyword(s):
Big Data
◽
Data Analysis
◽
Information Security
◽
Big Data Analysis
◽
Security Model
◽
Model Based
Start Chat
Download Full-text
Intelligent manufacturing security model based on improved blockchain
Mathematical Biosciences and Engineering
◽
10.3934/mbe.2020303
◽
2020
◽
Vol 17
(5)
◽
pp. 5633-5650
Author(s):
Jiahe Xu
◽
◽
Yuan Tian
◽
Tinghuai Ma
◽
Najla Al-Nabhan
◽
...
Keyword(s):
Intelligent Manufacturing
◽
Security Model
◽
Model Based
Start Chat
Download Full-text
An application security model based on business process in information system
2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)
◽
10.1109/iske.2017.8258785
◽
2017
◽
Author(s):
Peng Xu
◽
Meirong Chen
◽
Lifang Feng
◽
Guanfeng Wu
◽
Fangli Ma
◽
...
Keyword(s):
Information System
◽
Business Process
◽
Security Model
◽
Application Security
◽
Model Based
Start Chat
Download Full-text
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks
KSII Transactions on Internet and Information Systems
◽
10.3837/tiis.2015.11.025
◽
2015
◽
Vol 9
(11)
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Route Request
Start Chat
Download Full-text
The Research of Web Security Model Based on JavaScript Hijacking Attack
Recent Advances in Computer Science and Information Engineering - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-642-25789-6_75
◽
2012
◽
pp. 555-563
Author(s):
Zhiguang Wang
◽
Chongyang Bi
◽
Wei Wang
◽
Pingping Dong
Keyword(s):
Web Security
◽
Security Model
◽
Model Based
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close