首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 59 毫秒
1.
提出了基于角色访问控制的移动工作流平台设计模型。借助于角色网络理论,通过角色访问控制技术将角色、权限、用户和任务等之间的关系体现出来。介绍了移动工作流技术,把移动工作流技术与基于角色的访问控制技术结合,并且在软件平台设计中体现出来,有利于远程办公,方便企业的应用。  相似文献   

2.
基于RBAC的信息系统访问控制模型   总被引:5,自引:1,他引:5  
王亚民 《情报杂志》2005,24(10):43-45
指出传统的以功能模块直接对用户进行权限分配已不利于系统管理和扩展。基于角色的访问控制(RBAC)强调用户的权限不是由用户名而是由用户在组织中的角色决定的,通过角色间接地访问系统资源,保证了权限配置的灵活性和安全性。研究RBAC的体系架构,提出了一种基于用户功能模块的权限管理机制,并给出了实现方法。  相似文献   

3.
权限管理基础设施,访问控制框架,策略规则共同构成权限管理和访问控制实施的系统平台,访问控制策略是决定用户访问权利的依据。论文首先定义了访问控制的有关概念,叙述了PMI的基本原理,重点阐述了在军事和安全部门中应用较多的MAC模式访问控制结构,详细分析了该模式下策略的实施流程,最后对MAC模式的优势进行讨论。  相似文献   

4.
基于角色的访问控制模型RBAC通过引入角色实现了用户和访问控制权限的逻辑分离,简化了系统授权过程,提高了权限管理模块的可重用性,是当前信息系统权限管理的主流策略。基于RBAC设计实现了一个B/S系统下通用的权限管理模块,通过客户端脚本控制页面访问操作,支持部分页呈现。  相似文献   

5.
针对柔性工作流在任务处理过程中动态实时进行安全管理提出一种面向任务控制的柔性工作流模型,该模型从任务的角度建立安全控制,动态地控制主体访问资源的权限,同时也实现了柔性工作流动态进行路由选择,实现了访问控制流与柔性工作流的同步,具有较好的灵活性。  相似文献   

6.
嵌入式Web系统的广泛应用,使得越来越多的安全隐患与资源管理问题暴露出来,如非法访问、窃听报文、篡改网页等。针对嵌入式Web系统所面临的安全威胁,建立了一种基于层次式的角色等级安全模型,依据此模型设计并实现了一个嵌入式Web系统。系统在访问控制模型中,根据不同的安全需求,将用户划分为不同的访问角色,各角色以各自拥有的权限来调用不同的服务。模型实现中还使用操作日志对用户访问后的操作行为进行安全管理,同时引入继承与授权等思想来增强代码的复用性,以简化程序。测试表明,本系统能够很好的在提高安全性的同时增加授权的灵活性,降低其复杂度。  相似文献   

7.
詹川 《现代情报》2013,33(12):113-118
有效、安全的知识共享是虚拟企业成功的关键因素之一。论文首先评述国内外学者专家的该领域研究,然后分析用户访问虚拟企业知识权限的主要影响因素:角色、任务和产品。根据上述3个因素构建了组织、活动和产品本体及内部逻辑关系。最后提出一个基于本体的虚拟企业知识访问控制模型,并通过应用实例演示该模型的工作过程。  相似文献   

8.
目前比较成熟的安全模型大部分是访问控制策略模型,用于描述与维护系统中数据的保密性和完整性。基于角色的访问控制(RBAC)借鉴了人们熟知的用户组、权限组以及职责分离的概念和应用,以角色为中心的权限管理更符合公司和企业的实际管理方式,所以RBAC模型的研究和应用发展得非常快。通过给用户分配恰当的角色,使角色拥有一定的权限成为访问控制的主体,可以提高管理效率。介绍了基于角色的出租车管理系统的部分设计;阐述了模块设计与应用和数据库的设计理念;成功地实现了对不同角色的安全访问控制,有效地解决了安全访问控制问题。  相似文献   

9.
针对传统的云平台协同计算中,顺序数据存取过程安全性差的问题。提出一种基于二叉树偏码匿名乱序的云平台协同计算方法。建立匿名乱序的云平台访问模型,对用户数据进行加密,构建访问权限控制系统,将用户数据与用户信息分离;利用二叉树偏码匿名乱序的方法对用户数据进行存储,在云平台中,用户通过签名密钥实现用数据的控制,云平台只负责数据的存储,从而保证了用户隐私的安全。仿真实验结果表明,改进算法能够保证用户的信息安全,从而提高了云平台计算的服务质量。  相似文献   

10.
在基于角色的访问控制(RBAC)模型结构的基础上,提出了一种多级权限访问控制模型。该模型采用逐级授权方式,细化了权限控制粒度,实现了权限动态配置、模块复用,能够更灵活高效地对系统进行权限访问控制。并将其应用于实际系统项目的建设。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号