2025 Vol.8 Jun.N03 |
---|
|
![]() |
Reference: [1]CAO Z H, CAI X Z, GU M H, et al. Android permission management and control scheme based on access control list mechanism [J]. Journal of Computer Applications, 2019, 39 (11): 3316-3322. [2]XIE J T. Simulation of access control method for laboratory update information resource [J]. Computer Simulation, 2019,36 (2): 435-438. [3]AN X, XIA J W, YANG H J, et al. Discrete controller synthesis based resource management method of heterogeneous multi-core processor system [J]. Journal of Computer Applications, 2020, 40 (6): 1698-1706. [4]LOU D G, LI R B, LIU B, et al. Access control method of virtualized resources in cloud computing data center [J]. Bulletin of Science and Technology, 2019, 35 (1): 169-172. [5]YAN X C, CHEN Y, BA Y, et al. Updatable attribute-based encryption scheme supporting dynamic change of user rights [J]. Journal of Computer Research and Development, 2020, 57 (5): 1057-1069. [6]CHEN G. A comparative study of local electronic resource usage statistics system for resolving HTTPS access data [J]. Library and Information Service, 2019, 63 (14): 36-43. [7]MA C Q, YAO J Y, HAN K, et al. A full resource predictive control approach to control systems subject to computational constraint [J]. Acta Automatica Sinica, 2019,45 (4): 730-738. [8]WU L N, JIA Y X, DOU T F, et al. The practice and research of electronic resources access problems in new library service platform [J]. Library and Information Service, 2020, 64 (6): 20-26. [9]Gulimire Erken, Nurmaimaimaiti Heilili. CP-ABE re-encryption based access control constraint for sensitive data [J]. Computer Engineering and Applications, 2020, 56 (18): 69-76. [10]ZHANG Z L, ZHANG Y R, MA S X. Concurrent conflict control method of "Multi-rights+Operation Queues" based on CPN tools [J]. Journal of System Simulation, 2019,31 (6): 1092-1100. [11]LIU A D, DU X H, WANG N, et al. Blockchain-based access control mechanism for big data [J]. Journal of Software, 2019,30 (9): 2636-2654. [12]WANG X L, JIANG X Z, LI Y. Model for data access control and sharing based on blockchain [J]. Journal of Software, 2019,30 (6): 1661-1669. [13]CHEN W, LI X P, JU J N. Research on user and permission management audit of information systems based on big data technology [J]. The Chinese Certified Public Accountant, 2019 (2): 74-79. [14]MO C F, YUE H D, LI Z C, et al. Study on optimizing financial information system of public hospitals under government accounting system[J]. Chinese Health Economics, 2019, 38 (12): 90-93. [15]ZHANG W L, GUO X, YANG K, et al. Design and implementation of a personnel information detection system for indoor environment control [J]. Journal of Beijing University of Technology, 2020, 46 (5): 456-465.
|
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16