Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more. 信息管理是一个庞大的主题,可涉及到有关内容管理策略、分布式访问、联合安全性等的讨论。
A federated approach to distributed data access can provide the required levels of data synchronization without an ODS. 联合的分布式数据访问方法无需ODS即可提供所需级别的数据同步。
A Distributed Network Access Control Method for Large-Scale Campus Network 一种分布式的大规模园区网络接入方案
Distributed Access Control Model over Multi-Trust Domain 多信任域的分布式访问控制模型研究
Research on DBA Algorithm based on the Distributed EPON Access Structure 支持分布式EPON接入结构的DBA算法的研究
Distributed Access Control for Remote User 远程访问中的分布式访问控制
We design a distributed access control model according to the character of the P2P networks. 针对P2P网络应用环境特点,提出了一种分布式安全访问控制模型。
Research of the Cache System in a Distributed Access Environment 分布访问环境中的数据缓存体系研究
Research on Distributed Access Control by Security E-government 电子政务安全中分布式访问控制的实现
Dedicated Traffic Processing for Distributed Access Architectures 分布式接入架构的专用流量处理
By prototype experiments, all real-time manipulation can be completed within 10 seconds, which verify the feasibility and validity of interoperability and the real time distributed access under the proposed architecture. 在原型实验中,所有实时操作都在10s内完成,这验证了在该体系结构下元数据的互操作性和实时分布式存取的可行性、有效性。
A distributed access control model for peer-to-peer networks 一种Peer-to-Peer环境下的分布式访问控制模型
The waste of roles and rights doubtlessly increased the complexity of role management, and equal role is inconvenient in achieve least privilege, those legacy of the old RBAC is not suitable to the character of the distributed access control. 角色和权限的冗余无疑增加了角色管理的复杂性,对等角色又不便于最小权限控制,这些传统的基于角色访问控制模型的不足,使其已不适合分布式访问控制的特点。
It also describes the configuration, functions and working pattern of the application framework and n layers distributed access logic model of the application framework. 给出了应用框架的组成结构和功能设计,论述了模型的n层分布式逻辑访问模型。
We propose a data audit criterion which can guarantee the creditability and security of the data in the central data registry and design an identity authentication method based on distributed access engine. 本文提出了一种确保中央数据登记薄中数据的可信性和安全性的数据审核规范及一种基于分布式访问引擎的身份认证方法。
According to the whole design scheme, this system adopt the opening distributed structure, and the repository was designed as a opening management flatform so as to the expert system has a character of opening and distributed access. 根据总体设计方案,开放式知识库故障诊断专家系统采用开放分布式结构,知识库被设计成一个开放式的知识库管理平台,使得整个专家系统具有良好的开放性以及分布式访问的特征。
A Multicast Distributed Access Control System 一个组播分布式访问控制系统
The Design and Implementation of a Distributed Access Control System Based on Trust-Management 一个基于信任管理的分布式访问控制系统的设计与实现
APON is a distributed access network with medium shared by different services. How to meet various QoS demands of different services and guarantee the transport efficiency is the core of MAC research. APON网络属于分布式媒质共享拓扑结构,所承载业务的QoS要求各异,如何在保证系统传输效率的同时满足用户对服务质量的需求,是APONMAC算法的关键。
Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path ( DCP) searching algorithm based on binary tree. 基于SPKI技术提出了组播分布式访问控制系统MDAC,并提出了基于二叉授权委托树的委托证书路径(DCP)查找算法。
It is an important research area to establish the communication between and tc have the distributed access to these databases. 建立这些异构型数据库的网络,实现它们之间的互连通信与分布式访问,这是分布式数据库研究的一个重要方面。
A Heterogeneous Database Network and Its Distributed Access 异构型数据库网络及其分布式访问
Distributed Access Control Using Authorization Certificates 利用授权证书实现分布式的访问控制
In this paper, we have discussed the limitations of traditional access control models in solves the problems of distributed access control models, and an enhanced access control policy composing algebra for attributed-based access control was proposed to composing access control policies. 本文研究了传统访问控制模型在解决分布式访问控制问题时的局限性,提出了一种改进的基于属性的访问控制策略合成代数方法来实现访问控制策略的合成。
The research of cloud computing utility security optimized model based on stochastic programming will expand the traditional theories and methods of distributed access control, and play a positive promoting role on solving many access control problems of distributed applications. 基于随机规划的云计算效用安全优化模型研究将拓展传统的分布式访问控制理论和方法,对解决众多分布式应用的访问控制问题起到积极的推进作用。
For the history data management component, we define the service interface of the components using the CORBA IDL; implement historical data storage based on Oracle Berkeley DB; support distributed access using CORBA Trading Service. 在历史数据管理组件中,使用CORBAIDL(接口定义语言)定义了组件的对外服务接口;基于OracleBerkeleyDB实现历史数据存储;基于CORBA交易服务实现对分布式访问的支持。
Propose a policy enforcement attestation approach which extends traditional remote attestation, so that the problem of trust establishment on the policy enforcement behavior of the terminal platform is solved and makes the distributed access control architecture more provable. 提出一种基于行为的使用控制策略执行证明方案,扩展了传统的远程证明,解决了策略执行行为的信任建立问题,增强了分布式访问控制架构的可验证性。
In highly distributed environments, data distribution and flow are inevitable between network nodes. Thus trustworthiness of the network nodes is one of the key security requirements for distributed access contrl in such cross-platform or even cross-domain interactions. 分布式环境下数据不可避免的要在大量分散节点间分发与流动,而在这种跨平台甚至跨域的分布式交互中,节点的可信性是分布式访问控制最重要的安全需求之一。
Existing distributed access control models can not adapt to the security needs of cloud computing environment, because of the single role, cannot adjust their active permissions dynamically and so on. 现有的分布式访问控制模型由于角色单一、主体权限不能动态调整等问题,已经很难适应云计算环境的安全需求。
As far as I know, it is the first tentative research on this trust evaluation mechanism and its application in distributed access control based on trusted computing. 据我所知,该信任评估方案及其在基于可信计算的分布式访问控制中的应用研究,尚属首次。