AccessControl相关论文
With the rapid development of cyberspace and smart home technology,human life is changing to a new virtual dimension wit......
Efficient response speed and information processing speed are among the characteristics of mo-bile edge computing (MEC).......
Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revo......
本文在分析分布式电源并网运行对配电网影响的基础上,提出了配电网分布式电源接入控制系统的总体架构,及应用功能设计.并重点介绍......
As an important part of access control,authorization is performed mostly by system administrator in most PDM systems.RBA......
本文在介绍e-Science背景,分析虚拟组织特点和安全需求的基础上,提出了一种基于自动信任协商的授权与访问控制模型TTN.该模型包含......
本文通过对基于角色的访问控制系统的介绍和分析,使读者领悟到该模型的一般原理,并通过实例详细阐述了一种基于角色与权限控制相结......
确保资源的合理访问,设计正确的控制协议很重要.本文针对对等网络,设计了基于信誉传递的资源访问控制协议框架,并建立了基于Petri......
IPv6地址“即插即用”特点,使得网络管理员在大规模IPv6的网络环境下难以对网络节点起到及时高效的管理作用.针对此情况,本系统借......
Attribute-based encryption with keyword search(ABKS) achieves both fine-grained access control and keyword search.Howeve......
A Case Study on Relationship between Apartments Environment and Burglary in Pudong New Area,Shanghai
This paper explores the relationship between apartmentsenvironment and burglaries in Pudong New Area,Shanghai by sam......
该论文着重讨论了分布网络环境下访问控制系统的方法和构架,并对访问控制中的一个关键性环节-分布环境下的用户身份认证从工程实践......
In the context of workflow systems, security-relevant aspect is related to the assignment of activities to (human or aut......
建立了星形拓扑结构的LAN排队模型,符合冲突避免网络访问协议.该模型基于单服务员、一定缓冲容量的排队系统,并对一个六节点的网络......