Welcome![Sign In][Sign Up]
Location:
Search - trust management

Search list

[Program docjxtatrust

Description: 一个关于JXTA的信任管理机制英文文章,介绍了poblano的信任机制,对于了解JXTA的安全管理非常有用-A trust management mechanism JXTA English article, the poblano introduction of confidence-building mechanisms, for the understanding of safety management JXTA very useful
Platform: | Size: 99328 | Author: 李新功 | Hits:

[Software EngineeringArcSDE

Description: ArcSDE是空间数据库引擎,允许用户用关系数据库管理系统(RDBMS)存储和管理空间数据.设计并实现了基于.NET平台的ArcSDE矢量数据访问的C+ +类库.这些类按托管和非托管两层进行设计,数据访问功能由非托管类调用ArcSDE C API 实现,托管类对外公开非托管类的功能,可被任何.NET兼容的程序设计语言调用. -ArcSDE spatial database engine that allows users to use relational database management system (RDBMS) store and manage spatial data. Designed and implemented based on. NET platform ArcSDE vector data access C++ Library. These classes by the Trust and Non-Hosted two-tier design, data access functions hosted by the category of non-ArcSDE C API calls to achieve, hosting category unmanaged public functions, can be any. NET-compatible programming language call.
Platform: | Size: 251904 | Author: zsl | Hits:

[OS programtb2-0.1

Description: 实现了开放环境下的信任管理功能,并能够分析和计算不同实体之间的直接和间接信任值-The realization of an open environment of trust management functions, and be able to analyze and between the different entities of direct and indirect trust value
Platform: | Size: 2098176 | Author: lw | Hits:

[WEB Codewang02equilibrium123

Description: 电子商务信任管理,国外算法,需要了解电子商务信任管理的 人可以下来看看 -E-commerce Trust Management
Platform: | Size: 118784 | Author: sky | Hits:

[Windows Developcerman

Description: 安全策略管理系统-改进了keynte信任管理系统,使其支持基于角色的访问控制-Security policy management system- improved keynte trust management system to support role-based access control
Platform: | Size: 372736 | Author: sdx | Hits:

[Windows Developbank

Description: 基于信任管理系统开发的银行系统例子,可以实现安全访问控制。-Based on Trust Management System developed by examples of the banking system.
Platform: | Size: 18432 | Author: sdx | Hits:

[OS programtrust-management-survey

Description: 网络安全类论文。调查类文章。可以提供一个对该领域全方位的预览。-Network security papers. Survey class articles.It can provide a comprehensive preview of the area.
Platform: | Size: 108544 | Author: 李桃 | Hits:

[OtherAddison.Wesley.The.Craft.of.System.Security.Dec.20

Description: After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing-After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures- with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a system' s security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing
Platform: | Size: 5532672 | Author: chen | Hits:

[Technology Managementeigentrust

Description: 这是一篇研究P2P信任管理的经典文章,全局信任模型EigenTrust。-This is one of the classic articles P2P Trust Management, the global trust model EigenTrust.
Platform: | Size: 163840 | Author: 余小震 | Hits:

[Otherrfc5011.txt

Description: Abstract This document describes a means for automated, authenticated, and authorized updating of DNSSEC "trust anchors". The method provides protection against N-1 key compromises of N keys in the trust point key set. Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s). This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record.
Platform: | Size: 15360 | Author: lie | Hits:

[JSP/JavadRBAC

Description: 对跨越多个管理域的系统而言,dRBAC是一个可升级、分散的信任管理和访问控制机制。dRBAC描述了依据角色的不同受控行为,角色在一个实体的信任域内定义并 可将这个角色传递地指派给不同信任域内的其他角色。属性证书[本质上是面向授权使用PKI的一种扩展方法,以支持与授权相关的任务。属性证书提供 一种解决方案,来验证属性到一个给定主体的绑定。-Dislributed Rolc~Based Access Contro1(dRBAC)is a scalable,decentralized trust—management and access— conlrol mechanism for systems that span multiple administrative domains.Attribute certification in esscncc is a way of eX— tending aulhentication-orienteel use of PK1 to support tasks rclated to authorization.In this paper,we address how to imple— ment dRBAC via attribute certificates for dynamic coalition environments.
Platform: | Size: 6458368 | Author: lichao | Hits:

[JSP/JavadRBAC

Description: dRBAC模型是适应于动态结盟环境的分布式信任管理和访问控制机制,具有第三方委托、值属性和证书预定等三个 特征.但dRBAC模型存在一些不足,体现在以下几个方面:委托的深度没有控制;委托链的循环搜索;角色的隐式提升;职责分 离原则的违背等.源码 针对dRBAC模型存在的问题进行了详细的讨论,提出了合理的解决方案,提高了dRBAC模型的安全性和实用性.本源码是drbac基于角色的访问控制系统的完整源码,实现了基于觉得的访问控制,并修正了规范中存在的bug,程序可以正确运行,上传文件同时提供了运行的指南-The dRBAC modelis a scalable,decentralized trust—management and access—control mechanism for systems that span multiple administrative domains.The dRBAC model supports three feathers:third—party delegations,valued attributes,cre— dential subscription.However,there are some limitations of the dRBAC model,which represent the following issues:no con— troI on the depth of delegation,circular search for delegation chain,covert promotion of role,violating separation of duty. In this paper,these issues are discussed in detail,and reasonable resolutions of these issues are proposed in order to improve the security and practicability of the dRBAC model.
Platform: | Size: 6473728 | Author: lichao | Hits:

[Technology Managementin-Sensor-Network

Description: 这是基于传感网的信任机制,并有实现方式学习这方面的同学可-2011-A Secure Data Aggregation based Trust Management Approach for Dealing with UntrustworthyMotes in Sensor Network
Platform: | Size: 392192 | Author: 笑言 | Hits:

[Software Engineeringredp3678

Description: Federated Identity and Trust Management
Platform: | Size: 592896 | Author: Bup Be Chanh | Hits:

[P2Pp2p_sim_12_21

Description: This P2P simulator is used in the evaluation of trust management algorithms
Platform: | Size: 897024 | Author: zhouwei | Hits:

[OtherAODVSampath

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[Linux-UnixAODVkalai

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[Linux-Unixsskal

Description: - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one. -- occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. - occurs when a link or node is carrying so much data that its quality of service deteriorates. - queuing delay, packet loss or the blocking of new connections. - cause missing packets, low energy efficiency, and long delay. Trust management is very important in WSN. . Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. .Malicious node problem is major issue in WSN. These node have both trusted and untrusted one.
Platform: | Size: 1024 | Author: sampath | Hits:

[Linux-Unixsamsar

Description: Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. To overcome the congestion due to many-to-one communication. To enhance the QoS in wireless sensor network using trust management. -Untrusted node (i.e. malicious) receive the sending data and do not pass it to the source. To overcome the congestion due to many-to-one communication. To enhance the QoS in wireless sensor network using trust management.
Platform: | Size: 1024 | Author: sampath | Hits:

[File FormatUse-Trust-Management-Module-to-Achieve-Effective-

Description: International Journal of Advanced Research in Computer Science and Software Engineering-International Journal of Advanced Research in Computer Science and Software Engineering
Platform: | Size: 809984 | Author: Kirti Bhushan Kapil | Hits:
« 12 »

CodeBus www.codebus.net