Based on the access control model, we proposed a remote access control scheme for resources using digital watermarking.
在现有的访问控制系统模型的基础上,提出了一个使用数字水印进行资源远程访问控制的方案。
This paper proposes a authentication and access control scheme which USES modified threshold DSA algorithm in P2P network.
在P 2 P网络中应用门限DSA算法,提出一种适应网络动态性强等特点的节点认证和访问控制方案。
Based on compound problem, this paper proposed an authentication-doubled access control scheme for information protection system.
本文基于复合问题针对信息保密系统提出了一种双重认证的存取控制方案。
Based on a one-way function, this paper proposed an authentication-doubled access control scheme for information protection system.
本文基于单向函数针对信息保密系统提出了一种双重认证的存取控制方案。
This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.
该文提出了一种多重组的访问控制方案,该方案使用集中式与分布协同式相结合的密钥更新算法实现了多权限的控制。
We analyze RBAC concept model, compare it with traditional access control scheme, and demonstrate the necessity of implement RBAC in Enterprise Information Systems.
本文从理论上研究了RBAC的概念模型,并与传统的安全访问控制相比较,论证了在企业信息系统中采用RBAC的必要性。
In this paper, we present an access control scheme that can resolve these issues, and propose a dynamic context-aware access control model (DCAAC) which extends RBAC with context constraints.
本文提出了一个上下文感知的访问控制模型(DCAAC),D CAAC扩展了RBAC模型,增加了上下文约束。
In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.
在用户层次结构的动态存取控制问题上,本文提出了一种安全有效的方案。
At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.
最后,在方案设计基础上实现本认证与访问控制系统,结合RADIUS认证服务器构建实验系统平台。
This resolving scheme is based on advanced J2EE platform, applies MVC pattern, Session Facade pattern and Data Access Object pattern to control E-mail from two directions of sending and receiving.
该解决方案架构在先进的J2EE平台之上,应用MVC模式、会话模式和在数据访问对象模式等J2EE开发模式,从收和发两个方向对电子邮件进行了有效控制。
The anonymity of blind signature scheme can be applied to the field of e-commerce, e-voting and anonymous access control and etc.
盲签名因其匿名性应用于电子商务、电子投票和匿名存取控制等领域。
Firstly, this paper analyzes the characteristic of access control of application, and the characteristic of application, brings forward the collectivity scheme of access control of application.
论文首先分析了应用系统访问控制的特征,和应用系统的特点,提出了应用系统访问控制的总体方案。
The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.
该方案对用户的认证是基于用户的权限进行的,定义了良好的资源访问控制模式,非常适合实际系统对内部网络用户有认证要求的场合。
To protect information from the ignorant, and the vile. an elaborate scheme of permissions is used. Permissions, also known as access control, are what determine who can do what to what.
为了避免信息受到无知者和恶意者的干扰,使用一种精心设计的“许可”,也叫“存取控制”,决定谁可以对什么做什么。
To protect information from the ignorant, and the vile. an elaborate scheme of permissions is used. Permissions, also known as access control, are what determine who can do what to what.
为了避免信息受到无知者和恶意者的干扰,使用一种精心设计的“许可”,也叫“存取控制”,决定谁可以对什么做什么。
应用推荐