相关期刊:《The Journal of China Universities of Posts and Telecommunications》《High-Confidence Computing》《Journal of Information Security》《China Communications》更多>>
funded by Princess Nourah bint Abdulrahman UniversityResearchers Supporting Project number (PNURSP2024R408), Princess Nourah bint AbdulrahmanUniversity, Riyadh, Saudi Arabia.
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...
Fundação para a Ciência e Tecnologia(FCT-MCTES);Portugal,under contract UIDB/00102/2020;Bluepharma,Coimbra,Portugal.The authors would like to acknowledge FCT for the financial support to João Gomes(CEECIND/01207/2018).
Wet granulation is one of the most important agglomeration processes,and high-shear granulation(HSG)one of the most employed technologies in the pharmaceutical industry.The most critical process parameters of HSG are ...
supported by the National Natural Science Foundation of China Project(No.62302540),please visit their website at https://www.nsfc.gov.cn/(accessed on 18 June 2024);The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020),Further details can be found at http://xt.hnkjt.gov.cn/data/pingtai/(accessed on 18 June 2024);Natural Science Foundation of Henan Province Youth Science Fund Project(No.232300420422),you can visit https://kjt.henan.gov.cn/2022/09-02/2599082.html(accessed on 18 June 2024).
In response to the challenges of generating Attribute-Based Access Control(ABAC)policies,this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents.This me...
Ciphertext-policy attribute-based encryption(CP-ABE) is widely employed for secure data sharing and access control. However, its dependence on a single authority introduces security and performance challenges. Despite...
supported by the National Key R&D Program of China(No.2022YFB4400703);the Special Project for Industrial Foundation Reconstruction and High Quality Development of Manufacturing Industry(TC220A04X-1);the Basic Research Program(No.JCKY2020604C011).
1 Introduction The Internet of Things(IoT)has facilitated the development of numerous fields in our lives.However,some equipment in IoT environment lacks sufficient storage and data processing capabilities[1].A feasib...
supported by National Key Research and Development Plan of China(Grant No.2020YFB1005600);Major Program of Guangdong Basic and Applied Research Project(Grant No.2019B030302008);National Natural Science Foundation of China(Grant No.61825203);Guangdong Provincial Science and Technology Project(Grant Nos.2017B010111005,2021A0505030033);National Joint Engineering Research Center of Network Security Detection and Protection Technology;Guangdong Key Laboratory of Data Security and Privacy Preserving。
A public-key authenticated encryption with keyword search(PAEKS)[1,2]system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token.This sy...
The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400);the Science and Technology Program of Guizhou Province(No.[2020]5017);the Research Project of Guizhou University for Talent Introduction(No.[2020]61);the Cultivation Project of Guizhou University(No.[2019]56);the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01];the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...
supported by the National Natural Science Foundation of China(Nos.62162018,61972412);the Natural Science Foundation of Guangxi(No.2019GXNSFGA245004);the Guilin Science and Technology Project(20210226-1);the Innovation Project of Guangxi Graduate Education(No.YCSW2022296).
Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT.However,data privacy is potentially risky when data is outsourced to cl...
financially supported by the Science and Technology Project of State Grid Customer Service Center(research on access control and searchable encryption technology of attribute encryption for data value-added service)(SGKF0000DFQT2200030).
Smart grid enhances the intelligence of the traditional power grid,which allows sharing varied data such as consumer,production,or energy with service consumers.Due to the untrustworthy networks,there exist potential ...
supported in part by the National Science Foundation of China(62272389);the Shenzhen Fundamental Research Program(20210317191843003);Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University(CX2022065);Gansu Science and Technology Association Young Science and Technology Talents Lifting Project(GXH20220530-10).
To protect the privacy of power data,we usually encrypt data before outsourcing it to the cloud servers.However,it is challenging to search over the encrypted data.In addition,we need to ensure that only authorized us...