Deep search:Searching for "access control" in 'ABSTRACT and KEYWORDGot 20 items.
index Title
1An application-layer based centralized information access control for VPN
Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao,...  Clicked:3685  Download:1440  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.2 P.240~249  DOI:10.1631/jzus.2006.A0240
2A practical and dynamic key management scheme for a user hierarchy
Author(s):Jeng Fuh-gwo, Wang Chung-ming  Clicked:3393  Download:1289  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.296~301  DOI:10.1631/jzus.2006.A0296
3Network-adaptive HD MPEG-2 video streaming with cross-layered channel monitoring in WLAN
Author(s):Park Sanghoon, Yoon Hayoung, Kim J...  Clicked:3292  Download:1270  Cited:9  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.5 P.885~893  DOI:10.1631/jzus.2006.A0885
4A cross-layer design approach on spectrum allocation and resource scheduling in cognitive PMP networks
Author(s):Jie CHEN, Min-jian ZHAO, Qiao ZHOU...  Clicked:3162  Download:1659  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.4 P.435~444  DOI:10.1631/jzus.A071373
5A cross-layer approach to enable multipacket transmission in MIMO-SDMA based WLAN
Author(s):Sheng-bo CHEN, Wei CHEN, Wei-lan H...  Clicked:4053  Download:1828  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.2 P.271~278  DOI:10.1631/jzus.A0820362
6Conflict detection and resolution for authorization policies in workflow systems
Author(s):Chen-hua MA, Guo-dong LU, Jiong QIU  Clicked:3812  Download:1490  Cited:4  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.8 P.1082~1092  DOI:10.1631/jzus.A0820366
7Consistency maintenance for constraint in role-based access control model
Author(s):HAN Wei-li, CHEN Gang, YIN Jian-we...  Clicked:3060  Download:1349  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.3 P.292~297  DOI:10.1631/jzus.2002.0292
8Minimal role mining method for Web service composition
Author(s):Chao Huang, Jian-ling Sun, Xin-yu ...  Clicked:4171  Download:1522  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.5 P.328-339  DOI:10.1631/jzus.C0910186
9A fine-grained access control model for relational databases
Author(s):Jie Shi, Hong Zhu  Clicked:3854  Download:2020  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.8 P.575-586  DOI:10.1631/jzus.C0910466
10An authorization model for collaborative access control
Author(s):Chen-hua Ma, Guo-dong Lu, Jiong Qiu  Clicked:3419  Download:1188  Cited:3  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.9 P.699-717  DOI:10.1631/jzus.C0910564
11Funneling media access control (MAC) protocol for underwater acoustic sensor networks
Author(s):Guang-yu Fan, Hui-fang Chen, Lei X...  Clicked:4118  Download:2213  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.11 P.932-941  DOI:10.1631/jzus.C1000388
12Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma,...  Clicked:4876  Download:5548  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
13Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences
Author(s):Ji-Hoon Park, Byung-Seo Kim  Clicked:3298  Download:1481  Cited:2  <Full Text>  <PPT> 465
Journal of Zhejiang University Science C  2014 Vol.15 No.6 P.470-481  DOI:10.1631/jzus.C1300269
14A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS co...
Author(s):Liang-fang Qian, Sen-lin Zhang, Me...  Clicked:4381  Download:1550  Cited:4  <Full Text>  <PPT> 912
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.3 P.217-226  DOI:10.1631/FITEE.1400187
15Anonymous-address-resolution model
Author(s):Guang-jia Song, Zhen-zhou Ji  Clicked:2143  Download:769  Cited:0  <Full Text>  <PPT> 262
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.10 P.1044-1055  DOI:10.1631/FITEE.1500382
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE