A building information model (BIM) is of upmost importance with a full life-time cycle in architecture engineering and construction industry. Smart construction relies on BIM to manipulate information flow, data flow, and management flow. Currently, BIM has been explored mainly for information construction and utilization, but there exist few works concerning information security, e.g., audits of critical models and exposure of sensitive models. Moreover, few BIM systems have been proposed to make use of new computing paradigms, such as mobile cloud computing, blockchain and Internet of Things. In this paper, we propose a Context-aware Access Control (CaAC) model for BIM systems on mobile cloud architectures. BIM data can be confidentially ...
2019 Spring.Includes bibliographical references.Workflow is the automation of process logistics for ...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
In modern communication environments, the ability to provide access control to services in a context...
© 2019 by the authors. A building information model (BIM) is of upmost importance with a full life-t...
Building Information Modeling (BIM) is envisioned as an indispensable opportunity in the architectur...
Building Information Modeling (BIM) is envisioned as an indispensable opportunity in the architectur...
The construction industry is currently facing the challenge of managing and sustaining increasing vo...
A building information model (BIM) is an electronic repository of structured, three-dimensional data...
In view of malicious insider attacks on cloud computing environments, a new Context-Aware Access Con...
One of the main security problems of Smart-M3 platform is a lack of dynamic security management supp...
There are a lot of security issues in cloud computing service environments such as virtualization, d...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
Cloud computing technology is regarded as a major transformational force that is causing unprecedent...
Abstract--The cloud platforms are consisted of a larger number of servers along with networking and ...
The role-based access control (RBAC) has become the widely used access control system for providing ...
2019 Spring.Includes bibliographical references.Workflow is the automation of process logistics for ...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
In modern communication environments, the ability to provide access control to services in a context...
© 2019 by the authors. A building information model (BIM) is of upmost importance with a full life-t...
Building Information Modeling (BIM) is envisioned as an indispensable opportunity in the architectur...
Building Information Modeling (BIM) is envisioned as an indispensable opportunity in the architectur...
The construction industry is currently facing the challenge of managing and sustaining increasing vo...
A building information model (BIM) is an electronic repository of structured, three-dimensional data...
In view of malicious insider attacks on cloud computing environments, a new Context-Aware Access Con...
One of the main security problems of Smart-M3 platform is a lack of dynamic security management supp...
There are a lot of security issues in cloud computing service environments such as virtualization, d...
Role based access control (RBAC) assigns access permissions to a role rather than a user. This simpl...
Cloud computing technology is regarded as a major transformational force that is causing unprecedent...
Abstract--The cloud platforms are consisted of a larger number of servers along with networking and ...
The role-based access control (RBAC) has become the widely used access control system for providing ...
2019 Spring.Includes bibliographical references.Workflow is the automation of process logistics for ...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
In modern communication environments, the ability to provide access control to services in a context...