An efficient attribute-based hierarchical data access control scheme in cloud computing View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2020-12-05

AUTHORS

Heng He, Liang-han Zheng, Peng Li, Li Deng, Li Huang, Xiang Chen

ABSTRACT

Security issues in cloud computing have become a hot topic in academia and industry, and CP-ABE is an effective solution for managing and protecting data. When data is shared in cloud computing, they usually have multiple access structures that have hierarchical relationships. However, existing CP-ABE algorithms do not consider such relationships and just require data owners to generate multiple ciphertexts to meet the hierarchical access requirement, which would incur substantial computation overheads. To achieve fine-grained access control of multiple hierarchical files effectively, first we propose an efficient hierarchical CP-ABE algorithm whose access structure is linear secret sharing scheme. Moreover, we construct an attribute-based hierarchical access control scheme, namely AHAC. In our scheme, when a data visitor’s attributes match a part of the access control structure, he can decrypt the data that associate with this part. The experiments show that AHAC has good security and high performance. Furthermore, when the quantity of encrypted data files increases, the superiority of AHAC will be more significant. More... »

PAGES

49

References to SciGraph publications

Identifiers

URI

http://scigraph.springernature.com/pub.10.1186/s13673-020-00255-5

DOI

http://dx.doi.org/10.1186/s13673-020-00255-5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1133277878


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China", 
          "id": "http://www.grid.ac/institutes/grid.412787.f", 
          "name": [
            "School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, China", 
            "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "He", 
        "givenName": "Heng", 
        "id": "sg:person.010036253613.36", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010036253613.36"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China", 
          "id": "http://www.grid.ac/institutes/grid.412787.f", 
          "name": [
            "School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, China", 
            "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zheng", 
        "givenName": "Liang-han", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China", 
          "id": "http://www.grid.ac/institutes/grid.412787.f", 
          "name": [
            "School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, China", 
            "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Li", 
        "givenName": "Peng", 
        "id": "sg:person.012562572663.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012562572663.42"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China", 
          "id": "http://www.grid.ac/institutes/grid.412787.f", 
          "name": [
            "School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, China", 
            "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Deng", 
        "givenName": "Li", 
        "id": "sg:person.014146066643.96", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014146066643.96"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China", 
          "id": "http://www.grid.ac/institutes/grid.412787.f", 
          "name": [
            "School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, China", 
            "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Huang", 
        "givenName": "Li", 
        "id": "sg:person.011136121553.43", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136121553.43"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China", 
          "id": "http://www.grid.ac/institutes/grid.412787.f", 
          "name": [
            "School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, China", 
            "Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chen", 
        "givenName": "Xiang", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/978-3-540-89754-5_33", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045883251", 
          "https://doi.org/10.1007/978-3-540-89754-5_33"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-20465-4_31", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046748952", 
          "https://doi.org/10.1007/978-3-642-20465-4_31"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s12652-018-0967-0", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1106158864", 
          "https://doi.org/10.1007/s12652-018-0967-0"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-70583-3_47", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030698783", 
          "https://doi.org/10.1007/978-3-540-70583-3_47"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11426639_27", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1005594046", 
          "https://doi.org/10.1007/11426639_27"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10586-017-0863-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085034914", 
          "https://doi.org/10.1007/s10586-017-0863-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-19379-8_4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021592316", 
          "https://doi.org/10.1007/978-3-642-19379-8_4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-70936-7_28", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038544856", 
          "https://doi.org/10.1007/978-3-540-70936-7_28"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1186/s13673-015-0027-0", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021254581", 
          "https://doi.org/10.1186/s13673-015-0027-0"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2020-12-05", 
    "datePublishedReg": "2020-12-05", 
    "description": "Security issues in cloud computing have become a hot topic in academia and industry, and CP-ABE is an effective solution for managing and protecting data. When data is shared in cloud computing, they usually have multiple access structures that have hierarchical relationships. However, existing CP-ABE algorithms do not consider such relationships and just require data owners to generate multiple ciphertexts to meet the hierarchical access requirement, which would incur substantial computation overheads. To achieve fine-grained access control of multiple hierarchical files effectively, first we propose an efficient hierarchical CP-ABE algorithm whose access structure is linear secret sharing scheme. Moreover, we construct an attribute-based hierarchical access control scheme, namely AHAC. In our scheme, when a data visitor\u2019s attributes match a part of the access control structure, he can decrypt the data that associate with this part. The experiments show that AHAC has good security and high performance. Furthermore, when the quantity of encrypted data files increases, the superiority of AHAC will be more significant.", 
    "genre": "article", 
    "id": "sg:pub.10.1186/s13673-020-00255-5", 
    "isAccessibleForFree": true, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.8303904", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.8941591", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.8299634", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": [
      {
        "id": "sg:journal.1136381", 
        "issn": [
          "2192-1962"
        ], 
        "name": "Human-centric Computing and Information Sciences", 
        "publisher": "Springer Nature", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "10"
      }
    ], 
    "keywords": [
      "CP-ABE algorithm", 
      "access control scheme", 
      "cloud computing", 
      "access structure", 
      "data access control scheme", 
      "hierarchical access control scheme", 
      "linear secret sharing scheme", 
      "access control structure", 
      "secret sharing scheme", 
      "data owners", 
      "CP-ABE", 
      "computation overheads", 
      "access control", 
      "multiple ciphertexts", 
      "better security", 
      "security issues", 
      "hierarchical files", 
      "sharing scheme", 
      "files increases", 
      "access requirements", 
      "computing", 
      "control scheme", 
      "hot topic", 
      "effective solution", 
      "high performance", 
      "visitor attributes", 
      "hierarchical relationships", 
      "algorithm", 
      "scheme", 
      "control structure", 
      "ciphertext", 
      "overhead", 
      "attributes", 
      "security", 
      "files", 
      "requirements", 
      "AHAC", 
      "academia", 
      "data", 
      "superiority", 
      "performance", 
      "owners", 
      "issues", 
      "topic", 
      "solution", 
      "industry", 
      "part", 
      "experiments", 
      "such relationships", 
      "structure", 
      "control", 
      "relationship", 
      "quantity", 
      "increase"
    ], 
    "name": "An efficient attribute-based hierarchical data access control scheme in cloud computing", 
    "pagination": "49", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1133277878"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1186/s13673-020-00255-5"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1186/s13673-020-00255-5", 
      "https://app.dimensions.ai/details/publication/pub.1133277878"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2022-12-01T06:42", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_868.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://doi.org/10.1186/s13673-020-00255-5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00255-5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00255-5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00255-5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00255-5'


 

This table displays all metadata directly associated to this object as RDF triples.

186 TRIPLES      21 PREDICATES      87 URIs      70 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1186/s13673-020-00255-5 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author Nfdce5584a3284926a4ef842202084097
4 schema:citation sg:pub.10.1007/11426639_27
5 sg:pub.10.1007/978-3-540-70583-3_47
6 sg:pub.10.1007/978-3-540-70936-7_28
7 sg:pub.10.1007/978-3-540-89754-5_33
8 sg:pub.10.1007/978-3-642-19379-8_4
9 sg:pub.10.1007/978-3-642-20465-4_31
10 sg:pub.10.1007/s10586-017-0863-y
11 sg:pub.10.1007/s12652-018-0967-0
12 sg:pub.10.1186/s13673-015-0027-0
13 schema:datePublished 2020-12-05
14 schema:datePublishedReg 2020-12-05
15 schema:description Security issues in cloud computing have become a hot topic in academia and industry, and CP-ABE is an effective solution for managing and protecting data. When data is shared in cloud computing, they usually have multiple access structures that have hierarchical relationships. However, existing CP-ABE algorithms do not consider such relationships and just require data owners to generate multiple ciphertexts to meet the hierarchical access requirement, which would incur substantial computation overheads. To achieve fine-grained access control of multiple hierarchical files effectively, first we propose an efficient hierarchical CP-ABE algorithm whose access structure is linear secret sharing scheme. Moreover, we construct an attribute-based hierarchical access control scheme, namely AHAC. In our scheme, when a data visitor’s attributes match a part of the access control structure, he can decrypt the data that associate with this part. The experiments show that AHAC has good security and high performance. Furthermore, when the quantity of encrypted data files increases, the superiority of AHAC will be more significant.
16 schema:genre article
17 schema:isAccessibleForFree true
18 schema:isPartOf N0641288d303446f59fa20f862be5b930
19 N12e68e8e51104c31807dcee9a5b1107a
20 sg:journal.1136381
21 schema:keywords AHAC
22 CP-ABE
23 CP-ABE algorithm
24 academia
25 access control
26 access control scheme
27 access control structure
28 access requirements
29 access structure
30 algorithm
31 attributes
32 better security
33 ciphertext
34 cloud computing
35 computation overheads
36 computing
37 control
38 control scheme
39 control structure
40 data
41 data access control scheme
42 data owners
43 effective solution
44 experiments
45 files
46 files increases
47 hierarchical access control scheme
48 hierarchical files
49 hierarchical relationships
50 high performance
51 hot topic
52 increase
53 industry
54 issues
55 linear secret sharing scheme
56 multiple ciphertexts
57 overhead
58 owners
59 part
60 performance
61 quantity
62 relationship
63 requirements
64 scheme
65 secret sharing scheme
66 security
67 security issues
68 sharing scheme
69 solution
70 structure
71 such relationships
72 superiority
73 topic
74 visitor attributes
75 schema:name An efficient attribute-based hierarchical data access control scheme in cloud computing
76 schema:pagination 49
77 schema:productId N04e295ed356f44deb531a30f5f7d4a28
78 Nd1f1e8d68a5f4694ba52b0ba11baf6e4
79 schema:sameAs https://app.dimensions.ai/details/publication/pub.1133277878
80 https://doi.org/10.1186/s13673-020-00255-5
81 schema:sdDatePublished 2022-12-01T06:42
82 schema:sdLicense https://scigraph.springernature.com/explorer/license/
83 schema:sdPublisher N41af6b31c65243ddb2ff754145153f8c
84 schema:url https://doi.org/10.1186/s13673-020-00255-5
85 sgo:license sg:explorer/license/
86 sgo:sdDataset articles
87 rdf:type schema:ScholarlyArticle
88 N04e295ed356f44deb531a30f5f7d4a28 schema:name doi
89 schema:value 10.1186/s13673-020-00255-5
90 rdf:type schema:PropertyValue
91 N0641288d303446f59fa20f862be5b930 schema:issueNumber 1
92 rdf:type schema:PublicationIssue
93 N12e68e8e51104c31807dcee9a5b1107a schema:volumeNumber 10
94 rdf:type schema:PublicationVolume
95 N36b5d4d68a0d4483b65613da62152181 rdf:first sg:person.012562572663.42
96 rdf:rest N68f72d7400e84748b60a6fb046e40d06
97 N41af6b31c65243ddb2ff754145153f8c schema:name Springer Nature - SN SciGraph project
98 rdf:type schema:Organization
99 N4340a70ba3d448f0bc823b9e21eea8bc schema:affiliation grid-institutes:grid.412787.f
100 schema:familyName Chen
101 schema:givenName Xiang
102 rdf:type schema:Person
103 N68f72d7400e84748b60a6fb046e40d06 rdf:first sg:person.014146066643.96
104 rdf:rest Nfa74cdba92b74140928827090ed1f79b
105 N96dcfa9229e74b72b5b53631a9ed96a4 schema:affiliation grid-institutes:grid.412787.f
106 schema:familyName Zheng
107 schema:givenName Liang-han
108 rdf:type schema:Person
109 Nbd73d4448f8141c987de2284639e0d47 rdf:first N4340a70ba3d448f0bc823b9e21eea8bc
110 rdf:rest rdf:nil
111 Nc326dbd30386457d878f5a993f8c492c rdf:first N96dcfa9229e74b72b5b53631a9ed96a4
112 rdf:rest N36b5d4d68a0d4483b65613da62152181
113 Nd1f1e8d68a5f4694ba52b0ba11baf6e4 schema:name dimensions_id
114 schema:value pub.1133277878
115 rdf:type schema:PropertyValue
116 Nfa74cdba92b74140928827090ed1f79b rdf:first sg:person.011136121553.43
117 rdf:rest Nbd73d4448f8141c987de2284639e0d47
118 Nfdce5584a3284926a4ef842202084097 rdf:first sg:person.010036253613.36
119 rdf:rest Nc326dbd30386457d878f5a993f8c492c
120 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
121 schema:name Information and Computing Sciences
122 rdf:type schema:DefinedTerm
123 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
124 schema:name Information Systems
125 rdf:type schema:DefinedTerm
126 sg:grant.8299634 http://pending.schema.org/fundedItem sg:pub.10.1186/s13673-020-00255-5
127 rdf:type schema:MonetaryGrant
128 sg:grant.8303904 http://pending.schema.org/fundedItem sg:pub.10.1186/s13673-020-00255-5
129 rdf:type schema:MonetaryGrant
130 sg:grant.8941591 http://pending.schema.org/fundedItem sg:pub.10.1186/s13673-020-00255-5
131 rdf:type schema:MonetaryGrant
132 sg:journal.1136381 schema:issn 2192-1962
133 schema:name Human-centric Computing and Information Sciences
134 schema:publisher Springer Nature
135 rdf:type schema:Periodical
136 sg:person.010036253613.36 schema:affiliation grid-institutes:grid.412787.f
137 schema:familyName He
138 schema:givenName Heng
139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010036253613.36
140 rdf:type schema:Person
141 sg:person.011136121553.43 schema:affiliation grid-institutes:grid.412787.f
142 schema:familyName Huang
143 schema:givenName Li
144 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136121553.43
145 rdf:type schema:Person
146 sg:person.012562572663.42 schema:affiliation grid-institutes:grid.412787.f
147 schema:familyName Li
148 schema:givenName Peng
149 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012562572663.42
150 rdf:type schema:Person
151 sg:person.014146066643.96 schema:affiliation grid-institutes:grid.412787.f
152 schema:familyName Deng
153 schema:givenName Li
154 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014146066643.96
155 rdf:type schema:Person
156 sg:pub.10.1007/11426639_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005594046
157 https://doi.org/10.1007/11426639_27
158 rdf:type schema:CreativeWork
159 sg:pub.10.1007/978-3-540-70583-3_47 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030698783
160 https://doi.org/10.1007/978-3-540-70583-3_47
161 rdf:type schema:CreativeWork
162 sg:pub.10.1007/978-3-540-70936-7_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038544856
163 https://doi.org/10.1007/978-3-540-70936-7_28
164 rdf:type schema:CreativeWork
165 sg:pub.10.1007/978-3-540-89754-5_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045883251
166 https://doi.org/10.1007/978-3-540-89754-5_33
167 rdf:type schema:CreativeWork
168 sg:pub.10.1007/978-3-642-19379-8_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021592316
169 https://doi.org/10.1007/978-3-642-19379-8_4
170 rdf:type schema:CreativeWork
171 sg:pub.10.1007/978-3-642-20465-4_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046748952
172 https://doi.org/10.1007/978-3-642-20465-4_31
173 rdf:type schema:CreativeWork
174 sg:pub.10.1007/s10586-017-0863-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1085034914
175 https://doi.org/10.1007/s10586-017-0863-y
176 rdf:type schema:CreativeWork
177 sg:pub.10.1007/s12652-018-0967-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1106158864
178 https://doi.org/10.1007/s12652-018-0967-0
179 rdf:type schema:CreativeWork
180 sg:pub.10.1186/s13673-015-0027-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021254581
181 https://doi.org/10.1186/s13673-015-0027-0
182 rdf:type schema:CreativeWork
183 grid-institutes:grid.412787.f schema:alternateName Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China
184 schema:name Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System, Wuhan, China
185 School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, China
186 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...