Semantic Scholar uses AI to extract papers important to this topic.
G3-PLC technology is the new generation technical specification, which has many advantages such as low rate, high reliability and… Expand In smart city, all kinds of users' data are stored in electronic devices to make everything intelligent. A smartphone is the most… Expand In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main… Expand A tree key graph design scheme for hierarchical multi-group access control with low communication overhead is presented. A… Expand Access control is the process of mediating every request to resources and data maintained by a system and determining whether the… Expand Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for… Expand This paper presents DocML, a Web‐based digital library of university data. The goal is to build a system capable of preserving… Expand Separation of duty, as a security principle, has as its primary objective the prevention of fraud and errors. This objective is… Expand Mobile code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java… Expand The integration of autonomous information systems causes a fundamental problem for security management. How to ensure a… Expand