Article
Computer Science, Hardware & Architecture
Sheng-Tzong Cheng, Gwo-Jiun Horng, Chih-Wei Hsu, Z. -Yu Su
Summary: This study proposes a user-based network access control protocol involving a Linux security module that securely authenticates users and controls network permissions from kernel space. It also presents extensions to prevent various attacks and ensure authorized users receive their network privileges. The research analyzes Linux operating system security enhancement technology and utilizes empirical algorithm analysis and enhanced virtualization technology to reduce hacker intrusion risks and implement resource permission management mechanisms.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Multidisciplinary Sciences
Hui Li, Ming Li
Summary: The purpose of this study is to develop patent data, control data access effectively, and protect patent information and content. The study analyzes traditional patent review systems and proposes a patent data protection scheme based on privacy protection using blockchain technology. The scheme is verified through simulation experiments and demonstrates improved security and model performance.
SCIENTIFIC REPORTS
(2022)
Article
Computer Science, Information Systems
Tao Wang, Li Kang, Jiang Duan
Summary: This study proposes a secure access control scheme with batch verification for vehicular ad hoc networks, which improves efficiency by using only two bilinear pairing operations to verify multiple requests. Performance analysis and extensive simulations demonstrate its advantages in terms of computation cost, communication overhead, and processing delay.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
SeukGue Hong, HyungBin Seo, MyungKeun Yoon
Summary: Data auditing is essential for maintaining data quality in network security monitoring, but it is often overlooked. Inconsistent labeling by different analysts is a common issue in this field. This article proposes a new automated data auditing method to identify incorrect labels and improve the accuracy of machine learning models used in network security monitoring through label correction. Experiments conducted on real and open data sets validate the effectiveness of the proposed method.
IEEE COMMUNICATIONS MAGAZINE
(2023)
Article
Computer Science, Theory & Methods
Aaliya Sarfaraz, Ripon K. Chakrabortty, Daryl L. Essam
Summary: In recent years, supply chains have become complex ecosystems requiring trust, provenance, and data privacy. Blockchain technology offers a distributed environment that is ideal for supply chain management (SCM) applications. However, concerns about data privacy have hindered the development of blockchains. This paper proposes AccessChain, an SCM access control framework based on an attribute-based access control (ABAC) model, to address the challenge of data privacy.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Information Systems
Suryakanta Panda, Samrat Mondal, Rinku Dewri, Ashok Kumar Das
Summary: This paper proposes an ABE scheme that supports access policy updates, and also provides forward security, backward security and user revocation. The performance analysis shows that the proposed scheme is efficient in communication and computation, and suitable for resource constrained devices.
COMPUTER COMMUNICATIONS
(2022)
Article
Engineering, Electrical & Electronic
Yousi Lin, Yaling Yang, Xiaojiang Du, Jie Wu
Summary: This paper proposes a secure and distributed algorithm for secondary user transmit power control, which achieves optimal power control by maximizing the sum of secondary user rates. The algorithm guarantees SINR coexistence between secondary users and incumbent users, while also protecting the location information of incumbent users from being revealed.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2022)
Article
Chemistry, Multidisciplinary
Anne M. Tall, Cliff C. Zou
Summary: This article presents a featured application that controls access to a large set of medical and social media data in a cloud environment using open-source Hadoop storage and Spark parallel processing. The use of attribute-based access control (ABAC) resolves security and privacy issues with big data processing.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Artificial Intelligence
Tae-Young Kim, Sung-Bae Cho
Summary: This paper proposes a method of optimizing CNN-LSTM neural networks with PSO for role classification in RBAC system. Experimental results show that the proposed method outperforms other models in classifying SQL queries.
Article
Computer Science, Information Systems
N. Saravanan, A. Umamakeswari
Summary: Cloud computing offers huge storage capacity, but users' data requires strong and effective protection techniques. Protecting data storage is challenging and difficult, and encrypting data is a promising method.
COMPUTERS & SECURITY
(2021)
Article
Automation & Control Systems
Amitesh Singh Rajput, Balasubramanian Raman
Summary: The popularity of wearable smart healthcare devices has led to a new service paradigm. However, the collection of massive sensitive medical data in order to improve service quality raises concerns about security risks and complexity. In this paper, the authors propose a solution using a directing authority called the transcryptor and polymorphic encryption to address the problems of entity authentication and data integrity. The proposed approach is demonstrated to be superior through performance testing and security analysis.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Weiting Zhang, Hanyi Zhang, Liming Fang, Zhe Liu, Chunpeng Ge
Summary: This article proposes a secure and revocable fine-grained access control and data sharing scheme for SCADA systems in industrial control and the IoT. The scheme enhances data security through fine-grained access control and digital signature technology.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Automation & Control Systems
Lijun Dong, Tiejun Wu, Wei Jia, Bo Jiang, Xinchuan Li
Summary: This study proposes a model of embedding-based computable access control (ECAC), which embeds access control rules into a vector space and calculates the security of behaviors using numerical vector operations, reducing the workload of access control. By embedding-based computation, the security of unknown behaviors can also be predicted, reducing the risk of privacy leakage through semantics.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Yixin Li, Bin Cao, Liang Liang, Deming Mao, Lei Zhang
Summary: This paper addresses the challenges of block propagation in wireless blockchain networks, analyzes the impact of the CSMA/CA protocol on the consensus process, and proposes corresponding solutions. The research findings show that by using mining strategies and Block Access Control methods, the performance of B-WLAN can be improved, achieving high transaction throughput and saving computational power.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Hardware & Architecture
Longbiao Chen, Zhihan Jiang, Dingqi Yang, Cheng Wang, Thi-Mai-Trang Nguyen
Summary: The emergence of fog-computing-based RAN architecture in 5G networks addresses the significant demands for mobile operators to increase data processing capacity and ensure user handover quality. By optimizing RRH clustering and BBU allocation, Fog-RAN can effectively handle data traffic and user mobility dynamics, leading to improved efficiency and reduced overhead in comparison to traditional RAN architectures.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Jia Ke, Ying Wang, Mingyue Fan, Xiaojun Chen, Wenlong Zhang, Jianping Gou
Summary: This study integrates the emotional correlation analysis model and Self-organizing Map (SOM) to construct fine-grained user emotion vector based on review text and perform visual cluster analysis, which helps platform merchants quickly mine user clustering and characteristics.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Shi Qiu, Huping Ye, Xiaohan Liao, Benyue Zhang, Miao Zhang, Zimu Zeng
Summary: This paper proposes a multilevel-based algorithm for hyperspectral image interpretation, which achieves semantic segmentation through multidimensional information fusion, and introduces a context interpretation module to improve detection performance.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Jianteng Xu, Qingguo Bai, Zhiwen Li, Lili Zhao
Summary: This study constructs two optimization models for the omnichannel closed-loop supply chain by leveraging the combined power of leader-follower game and mean-variance theories. The focus is on analyzing the performance of manufacturers who distribute products through physical stores. The results show that the risk-averse attitude of the physical store has a positive impact on the overall system profitability, but if the introduced physical store belongs to another firm, total profit experiences a decline.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Jiahao Xiong, Weihua Ou, Zhonghua Liu, Jianping Gou, Wenjun Xiao, Haitao Liu
Summary: This paper proposes a novel remote photoplethysmography framework, named GraphPhys, which utilizes graph neural network to extract physiological signals and introduces Average Relative GraphConv for the task of remote physiological signal measurement. Experimental results show that the methods based on GraphPhys significantly outperform the original methods.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Zhiyao Tong, Yiyi Hu, Chi Jiang, Yin Zhang
Summary: The rise of illicit activities involving blockchain digital currencies has become a growing concern. In order to prevent illegal activities, this study combines financial risk control with machine learning to identify and predict the risks of users with poor credit. Experimental results demonstrate high performance in user financial credit analysis.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)