Quantcast
Channel: IT Research Paper » Access Control
Browsing latest articles
Browse All 10 View Live

Research on Security Access Control Mechanism in Outsourced Database

In outsourced databases model, the third-party server may not be completely trusted. One of the challenges that the outsourced database faces is its security issue. Data security and data privacy are...

View Article



RBAC Model Researchapplication Based on JAVA EE and Clustering Technology...

Access control is a syetem security technology which achieves established information security policies. In the system, if the case that legitimate users use the resources illegally or illegal users...

View Article

Analysis and Design of Single Sign on in Web Application

Blog, it shares interactive Web applications such as emphasis to meet the network users humane, social needs, as users of the application of the most attractive site.These Web applications are using B...

View Article

Analysis and Design of Single Sign on in Web Application

Blog, it shares interactive Web applications such as emphasis to meet the network users humane, social needs, as users of the application of the most attractive site.These Web applications are using B...

View Article

Design and Implementation on Control-Flow System of Satellite Remote Sesing...

Currently, satellite remote sensing images have been widely used in the production and life. Satellite remote sensing images’high value and high price make the control-flow of satellite remote sensing...

View Article


Research about Security of Railway Logistics Network

Modern logistics takes informatization and marketization as its main feature, mainly focus on gaining more space and benefits in the market and achieving value-added services with totally new concept...

View Article

The Research and Design of Access Control Model Based on Attribute in the Web...

With the rapid development of global informatization and distributed network technologies, in order to deal with the the issue of internal resource sharing in enterprises and institutions effectively,...

View Article

Research on Information Security Technologies of Smart Transmission Grid

Smart transmission grid is the most important part of smart grid, it is composed of energy power system, information communication system and monitoring control system, where the information...

View Article


Study on Analysis Tools for SELinux Security Policy

In today’s information society, people’s daliy activities are more and more closely associated with computers. At the same time, computer users are frequently plagued by malicious codes and programs...

View Article


Design and Development of Entrance Guard System Based on Simpass Technology

Along with the social economy to the level of informationization level and improve continuously, Entrance guard SYSTEM (ACCESS SYSTEM) as a kind of new typed Modern safety management system in our...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images