Citation: | ZOU Junwei, LAN Jiewei, WANG Xiaoke, et al., “Multi-attribute-Based Access Control Policy for Supply Chain Data Service,” Chinese Journal of Electronics, vol. 27, no. 6, pp. 1283-1290, 2018, doi: 10.1049/cje.2018.08.004 |
Till Quack, Herbert Bay and Luc Van Gool, “Object recognition for the internet of things”, First International Conference of the Internet of Things, Springer, Berlin, Heidelberg, pp.230-246, 2008.
|
Benjamin Fabian and Oliver Günther,“Security challenges of the EPCglobal network”,Communications of the ACM, Vol.52, No.7, pp.121-125, 2009.
|
Hua Lan,“The change of supply chain mode”, Logistic and Supply Chain, Vol.12, pp.52-54, 2010.
|
Ping Xia and Kai Liu,“A study and discussion of emergency supply chain”, Logistic Technology, Vol.10, pp.111-113, 2009.
|
Gilvan C. Souza, “Supply chain analytics”, Business Horizons, Vol.57, No.5, pp.595-605, 2014.
|
Ales Groznik and Peter Trkman, “Current issues and challenges of supply chain management”, Economic researchEkonomskaistraživanja, Vol.25, No.4, pp.1101-1112, 2012.
|
JunbeomHur and Dong Kun Noh, “Attribute-based access control with efficient revocation in data outsourcing systems”, IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.7, pp.1214-1221, 2011.
|
Fan Hong, Xueming Tnag, Yongquan Cui and Tao Long, The Conception of Access Control, Huazhong University of Science and Technology Press, 2010.
|
Ed Coyne and Timothy R. Weil, “ABAC and RBAC: Scalable, flexible and auditable access management”, IT Professional, Vol.15, No.3, pp.14-16, 2013.
|
JunbeomHur, “Improving security and efficiency in attributebased data sharing”, IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
|
Lo-Yao Yeh, Yen-Cheng Chen and Jiun-Long Huang, “ABACS: An attribute-based access control system for emergency services over vehicular ad hoc networks”, IEEE Journal on Selected Areas in Communications, Vol.29, No.3, pp.630-643, 2011.
|
Jie Shi, Yingjiu Li and Robert H. Deng, “A secure and efficient discovery service system in EPCglobal network”, Computers and Security, Vol.31, No.8, pp.870-885, 2012.
|