Access Control(AC)is one of the important technologies of System Security and has been widely studied recently because the traditionary AC technologies can' t meet with the security commands of contemporary imform...Access Control(AC)is one of the important technologies of System Security and has been widely studied recently because the traditionary AC technologies can' t meet with the security commands of contemporary imformation system. As a result,the traditionary AC technologies have been developed and some new technologies have been put forward. This paper makes the necessary classification for the more-than-ten-year research results of the AC technology,together with the analysis and predication for the development trend of the AC technology in the future.展开更多
The diversity of security requirements demands that information systems flexibly support policies,and uni-form policy description is important to implement policy-flexible system. This paper brings up new method to de...The diversity of security requirements demands that information systems flexibly support policies,and uni-form policy description is important to implement policy-flexible system. This paper brings up new method to descriptpolicies based on trace, which can be applied to many policies used currently. Subsequently this paper refines thismethod in order to be applicable to actual system ,and discusses how to merge multiple policies.展开更多
利用拥塞环境下网络业务流的混沌特性,提出了一种基于加权一阶局域法的公共拥塞检测方法.采用混沌信号处理方法对延时采样序列进行分析,能够迅速地判断出2个流是否通过了同一段拥塞链路.仿真结果表明,在长TCP(Transmission Control Prot...利用拥塞环境下网络业务流的混沌特性,提出了一种基于加权一阶局域法的公共拥塞检测方法.采用混沌信号处理方法对延时采样序列进行分析,能够迅速地判断出2个流是否通过了同一段拥塞链路.仿真结果表明,在长TCP(Transmission Control Protocol)流,短TCP流,UDP(Us-er Datagram Protocol)流3种网络环境下,该方法具有比相关方法更好的性能,对于开发协同拥塞控制算法以及智能重叠网络的构建都有良好的应用前景.展开更多
文摘Access Control(AC)is one of the important technologies of System Security and has been widely studied recently because the traditionary AC technologies can' t meet with the security commands of contemporary imformation system. As a result,the traditionary AC technologies have been developed and some new technologies have been put forward. This paper makes the necessary classification for the more-than-ten-year research results of the AC technology,together with the analysis and predication for the development trend of the AC technology in the future.
文摘The diversity of security requirements demands that information systems flexibly support policies,and uni-form policy description is important to implement policy-flexible system. This paper brings up new method to descriptpolicies based on trace, which can be applied to many policies used currently. Subsequently this paper refines thismethod in order to be applicable to actual system ,and discusses how to merge multiple policies.
文摘利用拥塞环境下网络业务流的混沌特性,提出了一种基于加权一阶局域法的公共拥塞检测方法.采用混沌信号处理方法对延时采样序列进行分析,能够迅速地判断出2个流是否通过了同一段拥塞链路.仿真结果表明,在长TCP(Transmission Control Protocol)流,短TCP流,UDP(Us-er Datagram Protocol)流3种网络环境下,该方法具有比相关方法更好的性能,对于开发协同拥塞控制算法以及智能重叠网络的构建都有良好的应用前景.