[PDF][PDF] 工作流程授權管理模式之研究

劉敦仁 - 2000 - ir.lib.nycu.edu.tw
… to insecure access. It is necessary to provide secure mechanisms for workflow management
The aim of this project is to investigate the access control and authorization management in …

网络安全等级保护下的区块链评估方法

朱岩, 张艺, 王迪, 秦博涵, 郭倩, 冯荣权, 赵章界 - 工程科学学报, 2020 - cje.ustb.edu.cn
authentication, access control, security audit, software fault tolerance, resource control, data
… 的访问控制策略 Bitcoin as a public blockchain, there is no complete access control strategy …

安全操作系统中用户账号的管理(英文)

张相锋, 孙玉芳 - 中国科学院大学学报, 2004 - journal.ucas.ac.cn
… any security mechanisms suchas mandatory access control , … The audit mechanism can help
review the access patterns … easy and finally achieve a secure system , SLINUX requires that …

一种面向云端辅助工业控制系统的安全机制

屠袁飞, 杨庚, 张成真 - 自动化学报, 2021 - aas.net.cn
… To address these issues in such a versatile and distributed environment, attribute-based
encryption is used to construct access control policies, provide authentication and authorization …

商业银行直销银行系统的设计与实现

张一帆 - 2017 - ir.lzu.edu.cn
… , DIY loan, settings, login in background system, system management, … account management,
financial product management, DIY loan management, electronic report, and review. We …

[HTML][HTML] DEAP: 適用於行動RFID 系統之高效能動態認證協定

JK Lin - 2016 - ir.lib.ncu.edu.tw
… Finally, through analysis and comparison, we prove the new RFID authentication protocol
that this study proposes can indeed ensure the security in mobile RFID systems to resist all …

复杂物联网联盟链系统通信机制研究

乔蕊, 刘敖迪, 陈迪, 王清贤 - 自动化学报, 2022 - aas.net.cn
… -verification transaction consensus mechanism is proposed. Experimental results show that
the above mechanism optimizes system performance while ensuring system security a lot. …

[PDF][PDF] 物聯網安全通訊標準與應用

CH Chen, BY Lin, CS Wu… - Communications of the …, 2017 - cccisa.ccisa.org.tw
… messages to a target device. Finally, a security server and security modules are designed
to perform mutual authorization and authentication according to access control lists and to …

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… the Internet of Things, finance, and other fields. However, the ledger of the blockchain is
shared, so that any user in the blockchain can directly access … contract with security and privacy …

大数据安全保障关键技术分析综述

王丹, 赵文兵, 丁治明 - 北京工业大学学报, 2017 - journal.bjut.edu.cn
… The research of access control and communication security for hadoop big data processing
[… XACML-based access control for decentralized online social networks[C]川 Proceedings of …