搜索资源列表
tiaoxingmakaifa
- 摘要:采用Foxpro2.5T3数据库开发平台开发了一种计算机机房和网吧收费管理系统,该系 统的帐户信h,基」几条形码识别身份,也可以直接键入用户帐户的数码,所需的用户信h,完全山 计算机集中管理。该系统是一种重l从对上机计费、值班人员工作日志与收费情况进行详细记 录,J{含有信任委托技术在内的机房网吧管理收费系统,系统成木低廉、运行速度快、代码紧 凑、功能健全、开发平台简单。 -Abstract : using Foxpro2.5T3 database developmen
200610102238539
- 管理超市,很好用的,虽然短但是实用,不信你来试试哦。欢迎大家支持 -management supermarkets, with a good, although short, however practical, not trust you to try oh. Welcome support
dRBAC
- dRBAC模型是适应于动态结盟环境的分布式信任管理和访问控制机制,具有第三方委托、值属性和证书预定等三个 特征.但dRBAC模型存在一些不足,体现在以下几个方面:委托的深度没有控制;委托链的循环搜索;角色的隐式提升;职责分 离原则的违背等.源码 针对dRBAC模型存在的问题进行了详细的讨论,提出了合理的解决方案,提高了dRBAC模型的安全性和实用性.本源码是drbac基于角色的访问控制系统的完整源码,实现了基于觉得的访问控制,并修正了规范中存在的bug,程序可以正确运行,上传文件同时
wang02equilibrium123
- 电子商务信任管理,国外算法,需要了解电子商务信任管理的 人可以下来看看 -E-commerce Trust Management
cerman
- 安全策略管理系统-改进了keynte信任管理系统,使其支持基于角色的访问控制-Security policy management system- improved keynte trust management system to support role-based access control
bank
- 基于信任管理系统开发的银行系统例子,可以实现安全访问控制。-Based on Trust Management System developed by examples of the banking system.
trust-management-survey
- 网络安全类论文。调查类文章。可以提供一个对该领域全方位的预览。-Network security papers. Survey class articles.It can provide a comprehensive preview of the area.
eigentrust
- 这是一篇研究P2P信任管理的经典文章,全局信任模型EigenTrust。-This is one of the classic articles P2P Trust Management, the global trust model EigenTrust.
rfc5011.txt
- Abstract This document describes a means for automated, authenticated, and authorized updating of DNSSEC "trust anchors". The method provides protection against N-1 key compromises of N keys in the trust point key set. Based on the trust esta
dRBAC
- 对跨越多个管理域的系统而言,dRBAC是一个可升级、分散的信任管理和访问控制机制。dRBAC描述了依据角色的不同受控行为,角色在一个实体的信任域内定义并 可将这个角色传递地指派给不同信任域内的其他角色。属性证书[本质上是面向授权使用PKI的一种扩展方法,以支持与授权相关的任务。属性证书提供 一种解决方案,来验证属性到一个给定主体的绑定。-Dislributed Rolc~Based Access Contro1(dRBAC)is a scalable,decentralized trust—
in-Sensor-Network
- 这是基于传感网的信任机制,并有实现方式学习这方面的同学可-2011-A Secure Data Aggregation based Trust Management Approach for Dealing with UntrustworthyMotes in Sensor Network
redp3678
- Federated Identity and Trust Management
p2p_sim_12_21
- This P2P simulator is used in the evaluation of trust management algorithms
AODVSampath
- - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs w
AODVkalai
- - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs w
sskal
- - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs w
samsar
- Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. To overcome the congestion due to many-to-one communication. To enhance the QoS in wireless sensor network using trust management. -Untrusted node (i.e
Use-Trust-Management-Module-to-Achieve-Effective-
- International Journal of Advanced Research in Computer Science and Software Engineering-International Journal of Advanced Research in Computer Science and Software Engineering
Cloud-Computing-Implementation--Management-and-Se
- While there is no arguing about the staying power of the cloud model and the benefits it can bring to any organization or government, mainstream adoption depends on several key variables falling into alignment that will provide users the reliab
13562451
- 本论文主要介绍了在无线传感器网络中的信任管理关键技术研究-This paper introduces the key technology of trust management in wireless sensor networks