ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Distributed Computing Security Model Based on Type System
Applications and Techniques in Information Security - Communications in Computer and Information Science
◽
10.1007/978-981-13-2907-4_9
◽
2018
◽
pp. 109-117
Author(s):
Yong Huang
◽
Yongsheng Li
◽
Qinggeng Jin
Keyword(s):
Distributed Computing
◽
Type System
◽
Security Model
◽
Model Based
Start Chat
Download Full-text
Related Documents
Cited By
References
A Verification Method of Security Model Based on UML and Model Checking
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2009.00699
◽
2009
◽
Vol 32
(4)
◽
pp. 699-708
Author(s):
Liang CHENG
◽
Yang ZHANG
Keyword(s):
Model Checking
◽
Security Model
◽
Verification Method
◽
Model Based
Start Chat
Download Full-text
A New Information Security Model Based on Network Service Protection
2009 First International Conference on Information Science and Engineering
◽
10.1109/icise.2009.91
◽
2009
◽
Cited By ~ 1
Author(s):
Wei Li
◽
Dongdong Wu
◽
Hui Lu
Keyword(s):
Information Security
◽
Security Model
◽
Network Service
◽
Model Based
◽
New Information
Start Chat
Download Full-text
The Design Research of Data Security Model Based on Public Cloud
2013 Ninth International Conference on Computational Intelligence and Security
◽
10.1109/cis.2013.133
◽
2013
◽
Cited By ~ 1
Author(s):
Xian Weiquan
◽
Wang Houkui
Keyword(s):
Data Security
◽
Design Research
◽
Security Model
◽
Public Cloud
◽
Model Based
Start Chat
Download Full-text
A Cross-Domain Security Model Based on Internet of Vehicles
EAI/Springer Innovations in Communication and Computing - Intelligent Mobile Service Computing
◽
10.1007/978-3-030-50184-6_1
◽
2020
◽
pp. 1-16
Author(s):
Wei Ou
◽
Meiyan Wei
◽
Qin Yi
◽
Lihong Xiang
Keyword(s):
Security Model
◽
Internet Of Vehicles
◽
Model Based
◽
Cross Domain
Start Chat
Download Full-text
E-commerce Transaction Information Security Model Based on Big Data Analysis
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43309-3_45
◽
2020
◽
pp. 322-328
Author(s):
Yang Wang
◽
Meng Tu
◽
Jiejie Cui
Keyword(s):
Big Data
◽
Data Analysis
◽
Information Security
◽
Big Data Analysis
◽
Security Model
◽
Model Based
Start Chat
Download Full-text
Intelligent manufacturing security model based on improved blockchain
Mathematical Biosciences and Engineering
◽
10.3934/mbe.2020303
◽
2020
◽
Vol 17
(5)
◽
pp. 5633-5650
Author(s):
Jiahe Xu
◽
◽
Yuan Tian
◽
Tinghuai Ma
◽
Najla Al-Nabhan
◽
...
Keyword(s):
Intelligent Manufacturing
◽
Security Model
◽
Model Based
Start Chat
Download Full-text
An application security model based on business process in information system
2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)
◽
10.1109/iske.2017.8258785
◽
2017
◽
Author(s):
Peng Xu
◽
Meirong Chen
◽
Lifang Feng
◽
Guanfeng Wu
◽
Fangli Ma
◽
...
Keyword(s):
Information System
◽
Business Process
◽
Security Model
◽
Application Security
◽
Model Based
Start Chat
Download Full-text
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks
KSII Transactions on Internet and Information Systems
◽
10.3837/tiis.2015.11.025
◽
2015
◽
Vol 9
(11)
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Route Request
Start Chat
Download Full-text
The Research of Web Security Model Based on JavaScript Hijacking Attack
Recent Advances in Computer Science and Information Engineering - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-642-25789-6_75
◽
2012
◽
pp. 555-563
Author(s):
Zhiguang Wang
◽
Chongyang Bi
◽
Wei Wang
◽
Pingping Dong
Keyword(s):
Web Security
◽
Security Model
◽
Model Based
Start Chat
Download Full-text
A Two-Phase Local Server Security Model Based on XML Certificate
Computational Science and Its Applications - ICCSA 2006 - Lecture Notes in Computer Science
◽
10.1007/11751649_106
◽
2006
◽
pp. 968-978
Author(s):
Yong-Hwa Kim
◽
Jin-Sung Kim
◽
Yong-Sung Kim
◽
Jang-Sup Shim
Keyword(s):
Security Model
◽
Two Phase
◽
Model Based
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close