ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Research of Access Authorization Model Based on Trust Negotiation in the P2P Network
Communications in Computer and Information Science - Advances in Information Technology and Education
◽
10.1007/978-3-642-22418-8_60
◽
2011
◽
pp. 422-427
Author(s):
Junyao Ye
◽
Yanhong Wang
◽
Yinglian Wang
Keyword(s):
P2p Network
◽
Trust Negotiation
◽
Model Based
◽
Authorization Model
Download Full-text
Related Documents
Cited By
References
Designing A Healthcare Authorization Model Based On Cloud Authentication
Intelligent Automation & Soft Computing
◽
10.1080/10798587.2014.888243
◽
2014
◽
Vol 20
(3)
◽
pp. 365-379
◽
Cited By ~ 7
Author(s):
Chin-Ling Chen
◽
Tsai-Tung Yang
◽
Fang-Yie Leu
◽
Yi-Li Huang
Keyword(s):
Model Based
◽
Authorization Model
Download Full-text
Research on The P2P Network Retrieval Model Based on The Information Reputation Stimulation
International Journal of Digital Content Technology and its Applications
◽
10.4156/jdcta.vol6.issue22.33
◽
2012
◽
Vol 6
(22)
◽
pp. 293-302
Author(s):
WU Xianping
Keyword(s):
P2p Network
◽
Retrieval Model
◽
Model Based
Download Full-text
Authorization model based on object-oriented concept
Proceedings 15th International Conference on Information Networking
◽
10.1109/icoin.2001.905332
◽
2002
◽
Cited By ~ 1
Author(s):
K. Izaki
◽
K. Tanaka
◽
M. Takizawa
Keyword(s):
Object Oriented
◽
Model Based
◽
Authorization Model
Download Full-text
Research on Modeling of Multiparty Trust Negotiation Based on Coloured Petri-net in P2P Network
2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing
◽
10.1109/nswctc.2010.109
◽
2010
◽
Author(s):
Li Yonghao
◽
Liu Yun
Keyword(s):
Petri Net
◽
P2p Network
◽
Trust Negotiation
◽
Coloured Petri Net
Download Full-text
GADAM: An Authorization Model Based on Attribute Delegation in Grid
2008 Workshop on Power Electronics and Intelligent Transportation System
◽
10.1109/peits.2008.45
◽
2008
◽
Cited By ~ 2
Author(s):
Rongbin Wang
◽
Shuyu Chen
◽
Jing Li
Keyword(s):
Model Based
◽
Authorization Model
Download Full-text
A Secure Dynamic Authorization Model Based on Improved CapBAC
2019 International Conference on Information Technology and Computer Application (ITCA)
◽
10.1109/itca49981.2019.00033
◽
2019
◽
Author(s):
Xu Zheng
◽
Yi Sun
◽
Zhaowen Lin
◽
Jiangsong Min
Keyword(s):
Model Based
◽
Authorization Model
◽
Dynamic Authorization
Download Full-text
Trust Model Based on P2P Network
Journal of Networks
◽
10.4304/jnw.8.9.2013-2020
◽
2013
◽
Vol 8
(9)
◽
Cited By ~ 1
Author(s):
Guang Ouyang
◽
Xiang Chen
Keyword(s):
Trust Model
◽
P2p Network
◽
Model Based
Download Full-text
Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information
Journal of Software
◽
10.4304/jsw.8.10.2668-2674
◽
2013
◽
Vol 8
(10)
◽
Author(s):
Hongwei Chen
◽
Shuping Wang
◽
Hui Xu
◽
Zhiwei Ye
◽
Chunzhi Wang
Keyword(s):
Incomplete Information
◽
Dynamic Game
◽
Trust Negotiation
◽
Negotiation Model
◽
Model Based
◽
Automated Trust Negotiation
Download Full-text
A P2P Network Model Based on Hierarchical Interest Clustering Algorithm
Journal of Software
◽
10.4304/jsw.8.5.1262-1267
◽
2013
◽
Vol 8
(5)
◽
Cited By ~ 4
Author(s):
Fanbin Meng
◽
Lei Ding
◽
Sheng Peng
◽
Guangxue Yue
Keyword(s):
Network Model
◽
Clustering Algorithm
◽
P2p Network
◽
Model Based
Download Full-text
A Workflow Authorization Model Based on Role and Task and Constraints Specification
Journal of Computer Research and Development
◽
10.1360/crad20051118
◽
2005
◽
Vol 42
(11)
◽
pp. 1946
Author(s):
Guanglin Xing
Keyword(s):
Model Based
◽
Authorization Model
◽
And Task
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close