Research and Pactice on Uniform Authorization Based on Access Control List
Rights management of information system is always an important part of security. In theory, research also has a very large number of results and models. Among of these theories, RBAC in particular...
View ArticleDesign and Implementation of JavaEE-based Management Information System for...
To promote the training of tax cadres scientificly, systematicly, standardized, it is related to the development of a tax base, strategic projects that train high quality taxing a contingent of cadres....
View ArticleResearch and Apphcation of the Security in Beinei Product Data Management System
The PDM which based on the open Internet network helps to share the product information resources and realize the integration of the manufacturing process between distributed enterprises and even...
View ArticleResearch of Role-based Web Services Security Policy
With the development of network information technology, the concept of SOA as Service-Oriented Architecture was put forward. In layman’s terms, SOA is a service that can make the distributed functions...
View ArticleResearch and Apphcation of the Security in Beinei Product Data Management System
The PDM which based on the open Internet network helps to share the product information resources and realize the integration of the manufacturing process between distributed enterprises and even...
View ArticleResearch of Role-based Web Services Security Policy
With the development of network information technology, the concept of SOA as Service-Oriented Architecture was put forward. In layman’s terms, SOA is a service that can make the distributed functions...
View ArticleDevelopment of Security Office Automation System and Research of Gradational...
There is particular provision on security system in every nation for the system’s particularity in use and its information’s importance, and in China we use “gradational security protection” as...
View ArticleRBAC Model Researchapplication Based on JAVA EE and Clustering Technology...
Access control is a syetem security technology which achieves established information security policies. In the system, if the case that legitimate users use the resources illegally or illegal users...
View ArticleThe Design and Implementation of Cloud Computing Access Control Gateway Based...
Cloud computing is growing rapidly, global sales of the top five software company’s main products are included cloud computing technology. Now Amazon’s EC2 and Google’s Google App Engine is a typical...
View ArticleResearch on Application of RBAC Model Based on Trust Computation in Mobile...
With the rapid development of mobile communication technology, the mobile phones have become indispensable in people’s life. How to guarantee the safety of the communication system and be reliable to...
View Article
More Pages to Explore .....