搜索资源列表
FingerChip_WhitePaper_11_12_02[1]
- This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy consumption and portability. This technology has application
biyesheji_jiyuACLdewangluo
- 毕业设计论文-反病毒的 随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。 本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分
RBAC-std-draft
- A Proposed Standard for Role-Based Access Control
RS485.rar
- 用RS485通信,实现门禁系统的控制,本程序主要实现通信代码。用51单片机,MAX485芯片通信,Using RS485 communications, the implementation of Access Control Systems control, implementation of this procedure the main communications code. With 51 single-chip, MAX485 chip communication
RBAC.rar
- 压缩包中是我近期正在研究的RBAC权限控制的部分资料,其中叙述了RBAC权限管理分析与实现,希望对RBAC研究的有帮助!,Compressed packet is being studied, I Recently RBAC access control some of the information, which describes the RBAC Rights Management Analysis and realization of the hope that research on
Chapter8.rar
- 数据库安全性实现的方法 自主存取控制(DAC)与强制存取控制(MAC) 授权(Authentication)与回收(GRANT&REVOKE) 数据库角色 ,Database security methods to achieve self-access control (DAC) and Mandatory Access Control (MAC) authority (Authentication) and recycling (GRANT & REVOKE) databas
A-complete-access-control-system-
- 一 套 完 整 的 门 禁 系 统 ( 原理图 + 源程序 )-A complete access control system (schematic+ source code)
door
- 这是本人设计的门禁电路图,已经实际生产,作为本公司的产品,在市场上使用。放在这里供大家参考,程序晚点上传。-This is my design of the access control circuit, has the actual production, as the company' s products in the market to use. Placed here for your reference, the program late upload.
802.11-2007
- Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications-Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
doc4661
- RFID Based Access Control system
EM4006
- RFID Based Access Control Systems
http___www.cypress
- RFID based access control systems
FingerprintAccessControSystem
- 指纹门禁系统的设计与开发--此文章为研究生毕业设计论文,仅供参考,版权为作者所有,请下载后于24小时内删除-Fingerprint Access Control System Design and Development
access-control-technology
- 介绍了信息安全中访问控制技术定义、访问控制技术策略、自主访问控制、强制访问控制等。-introduce the access control technology in IT security,include discretionary access control(DAC or IBAC) and mandatory access control (MAC) and so on!
Biometrics---Access-Control---Smart-Cards---
- Biometrics Access Control - Smart Cards - A Not So Simple-Biometrics Access Control - Smart Cards - A Not So Simple
Semantic-Web-Access-Control
- A Semantic Web Based Framework for Social Network Access Control 基于Semantic Web的社交网路控制框架-A Semantic Web Based Framework for Social Network Access Control
Access-Control-Scheme-in-Cloud
- :云服务中现有访问控制方案对可信第三方具有强烈依赖性。针对该问题,提出一个基于属性的分布式云访问控制方案。建立云访 问控制模型,采用ABE的加密树方式构造访问控制策略,并给出用户撤销及策略更新方法。安全性分析表明,该方案能够抵抗共谋攻击, 具有数据保密性以及后向前向保密性。-Now existing access control scheme has the strong dependence to trusty third party in cloud.With regard to t
a-Role-Based-Access-Control-Model
- 广义时空中基于角色的访问控制模型的规范,验证和实施。我们展示了如何运用基于UML的规范环境工具去分析一个应用程序的时空访问控制模型。我们提出了一个可以实现我们模型的架构,并提供了一个协议。-Generalized space in role-based access control model specification, verification and implementation. We show how to use UML-based tool to analyze a regulat
Access-Control
- 无线传感器网络中基于使用控制的安全访问方案。在我们的方案中所提出的身份验证协议有几大优势,其中最主要的是它在计算,存储和通信中的耗费都很低。此外,我们的方案还可以执行那些具有属性可变性和决策连续性的访问控制。-Wireless sensor networks based on the use of security access control solutions. In our scenario, the proposed authentication protocol has several
Decentralized-Access-Control-with-Anonymous-Authe
- Decentralized access project in java