Quantcast
Channel: IT Research Paper » RBAC
Browsing latest articles
Browse All 10 View Live

Research and Pactice on Uniform Authorization Based on Access Control List

Rights management of information system is always an important part of security. In theory, research also has a very large number of results and models. Among of these theories, RBAC in particular...

View Article



Design and Implementation of JavaEE-based Management Information System for...

To promote the training of tax cadres scientificly, systematicly, standardized, it is related to the development of a tax base, strategic projects that train high quality taxing a contingent of cadres....

View Article

Research and Apphcation of the Security in Beinei Product Data Management System

The PDM which based on the open Internet network helps to share the product information resources and realize the integration of the manufacturing process between distributed enterprises and even...

View Article

Research of Role-based Web Services Security Policy

With the development of network information technology, the concept of SOA as Service-Oriented Architecture was put forward. In layman’s terms, SOA is a service that can make the distributed functions...

View Article

Research and Apphcation of the Security in Beinei Product Data Management System

The PDM which based on the open Internet network helps to share the product information resources and realize the integration of the manufacturing process between distributed enterprises and even...

View Article


Research of Role-based Web Services Security Policy

With the development of network information technology, the concept of SOA as Service-Oriented Architecture was put forward. In layman’s terms, SOA is a service that can make the distributed functions...

View Article

Development of Security Office Automation System and Research of Gradational...

There is particular provision on security system in every nation for the system’s particularity in use and its information’s importance, and in China we use “gradational security protection” as...

View Article

RBAC Model Researchapplication Based on JAVA EE and Clustering Technology...

Access control is a syetem security technology which achieves established information security policies. In the system, if the case that legitimate users use the resources illegally or illegal users...

View Article


The Design and Implementation of Cloud Computing Access Control Gateway Based...

Cloud computing is growing rapidly, global sales of the top five software company’s main products are included cloud computing technology. Now Amazon’s EC2 and Google’s Google App Engine is a typical...

View Article


Research on Application of RBAC Model Based on Trust Computation in Mobile...

With the rapid development of mobile communication technology, the mobile phones have become indispensable in people’s life. How to guarantee the safety of the communication system and be reliable to...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images