Citation: | HAN Pei-sheng, ZHAO Yong, LI Yu. Process-Consistent Access Control System[J]. Journal of Beijing University of Technology, 2010, 36(5): 698-702. |
[1] | YANG Ruizhe, HE Ruilan, SUN Enchang, ZHANG Hui, ZHANG Yanhua. Air Access Network in 6G Technology: Progress and Prospect[J]. Journal of Beijing University of Technology, 2022, 48(11): 1175-1188. DOI: 10.11936/bjutxb2021050008 |
[2] | DUAN Jianmin, YANG Chen, SHI Hui. Path Tracking Based on Pure Pursuit Algorithm for Intelligent Vehicles[J]. Journal of Beijing University of Technology, 2016, 42(9): 1301-1306. DOI: 10.11936/bjutxb2015060065 |
[3] | YE Shaozhen, CHEN Liqing. Searchable Attribute-based Encryption Access Control Scheme[J]. Journal of Beijing University of Technology, 2016, 42(8): 1160-1166. DOI: 10.11936/bjutxb2015080017 |
[4] | ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan, LIU Gong-zheng, LIU Ruo-hong. Scheme for Dynamic Access Control Based on Trust[J]. Journal of Beijing University of Technology, 2014, 40(9): 1422-1427. |
[5] | ZHAO Yong, LIAO Jian-hua, SHEN Chang-xiang. Industry Control System Security Assurance Method Based on Access Verification[J]. Journal of Beijing University of Technology, 2013, 39(12): 1861-1867. |
[6] | XU Fei, HE Jing-sha, XU Jing, ZHANG Yu-qiang. Access Control Model for Privacy Protection[J]. Journal of Beijing University of Technology, 2012, 38(3): 406-409. |
[7] | PAN Li-li, ZOU Bei-ji, WANG Tian-e, CHEN Hao. Analysis of the Infeasible Path Based on Key Branch[J]. Journal of Beijing University of Technology, 2010, 36(5): 716-720. |
[8] | FAN Yan-fang, HAN Zhen, ZHAO Yong, GENG Xiu-hua. The Mandatory Access Control Model for Document Flow[J]. Journal of Beijing University of Technology, 2010, 36(5): 694-697. |
[9] | REN Xing-tian, HUANG Xiao-hong, SU Yu-jie, MA Yan. XML-based Access Control Model for Service Management Information[J]. Journal of Beijing University of Technology, 2009, 35(10): 1412-1418. |
[10] | Zhu Wenchao, Liu Hinzhen, Chen Jianzhong. Development of a Special-purpose Database Management System Based on Microsoft Access Client/Server Mode[J]. Journal of Beijing University of Technology, 1999, 25(2): 114-118,128. |