期刊文献+
共找到1,659篇文章
< 1 2 83 >
每页显示 20 50 100
Role based access control design using Triadic concept analysis 被引量:9
1
作者 Ch.Aswani Kumar S.Chandra Mouliswaran +1 位作者 LI Jin-hai C.Chandrasekar 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3183-3191,共9页
Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics... Role based access control is one of the widely used access control models.There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis(FCA),description logics,and Ontology for representing access control mechanism.However,while using FCA,investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts.This transformation is mainly to derive the formal concepts,lattice structure and implications to represent role hierarchy and constraints of RBAC.In this work,we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts.Our discussion is on two lines of inquiry.We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature. 展开更多
关键词 access control concept lattice role based access control role hierarchy triadic context triadic concept analysis
下载PDF
Consistency maintenance for constraint in role-based access control model 被引量:3
2
作者 韩伟力 陈刚 +1 位作者 尹建伟 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第3期292-297,共6页
Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenan... Constraint is an important aspect of role based access control and is sometimes argued to be the principal motivation for role based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD PDM, an enterprise oriented product data management (PDM) system. 展开更多
关键词 Consistency maintenance role based access control Product data management CONSTRAINT
下载PDF
Two Different Role Division Control Strategies for Torque and Axial Force of Conical Bearingless Switched Reluctance Motor 被引量:1
3
作者 HAO Zhenyang MIAO Wei +1 位作者 CAO Xin ZHANG Qiyao 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第6期848-857,共10页
Although the five-degree-of-freedom magnetic levitation system composed of two conical bearingless switched reluctance motors(CBSRMs)owns the simplest structure,the torque and levitation forces are coupled greatly.The... Although the five-degree-of-freedom magnetic levitation system composed of two conical bearingless switched reluctance motors(CBSRMs)owns the simplest structure,the torque and levitation forces are coupled greatly.Therefore,it is difficult to make the rotor rotate and be fully levitated simultaneously.To solve this problem,two different role division control strategies are proposed in this paper,i.e.individual role division and mutual role division control strategies.The difference between them is the selection of motor which controls the torque or the axial force.In order to understand the characteristics of control variables,the principle and mathematical model of CBSRM are introduced.After that,two control strategies are explained in detail.To verify the demonstrated performance,the simulations are completed with MATLAB/Simulink. 展开更多
关键词 five-degree-of-freedom magnetic levitation conical bearingless switched reluctance motor(CBSRM) individual role division control mutual role division control
下载PDF
The Roles of Countrywomen in Controlling Non-point Source Pollution 被引量:4
4
作者 Jiang Dongmei Zhou Yuanfang Lu Genfa 《Chinese Journal of Population,Resources and Environment》 北大核心 2006年第2期28-32,共5页
The main causes of non-point source pollution in Taihu Lake are the improper ways of crop production, animal husbandry, and daily runoff. The paper discusses the relationship between countrywomen and non-point source ... The main causes of non-point source pollution in Taihu Lake are the improper ways of crop production, animal husbandry, and daily runoff. The paper discusses the relationship between countrywomen and non-point source pollution control by 731 questionnaires in Weidu village and 466 questionnaires in Dapu Town. The roles of countrywomen have changed in families and they have close relationship with non-point source pollution. Furthermore, we discuss the possibility and methods of organizing countrywomen in non-point source pollution control. 展开更多
关键词 countrywomen non-point source pollution control role
下载PDF
A distributed role-based access control model for multi-domain environments 被引量:1
5
作者 洪帆 朱贤 邢光林 《Journal of Shanghai University(English Edition)》 CAS 2006年第2期134-141,共8页
Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mappin... Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed. 展开更多
关键词 role access control MULTI-DOMAIN DELEGATION mapping.
下载PDF
校园网中的Role-based Access Control模型设计 被引量:2
6
作者 王新月 《计算机与现代化》 2004年第3期54-57,共4页
介绍了如何将Role basedAccessControl(RBAC)模型应用于校园网的访问控制系统中。其特点是通过分配和取消角色来完成用户权限的授予和取消 ,并且提供了角色分配规则和操作检查规则。安全管理人员根据需要定义各种角色 ,并设置合适的访... 介绍了如何将Role basedAccessControl(RBAC)模型应用于校园网的访问控制系统中。其特点是通过分配和取消角色来完成用户权限的授予和取消 ,并且提供了角色分配规则和操作检查规则。安全管理人员根据需要定义各种角色 ,并设置合适的访问权限 ,而用户根据其责任和资历被指派为不同的角色。根据系统的实际需求 。 展开更多
关键词 校园网 role-BASED ACCESS control模型 设计 访问控制系统 角色分配规则
下载PDF
Centralized Role-Based Access Control for Federated Multi-Domain Environments
7
作者 YU Guangcan LU Zhengding +1 位作者 LI Ruixuan MUDAR Sarem 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1688-1692,共5页
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas... The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains. 展开更多
关键词 RBAC(role based access control federated MULTI-DOMAIN
下载PDF
An Efficient Role and Object Based Access Control Model Implemented in a PDM System
8
作者 HUANG Xiaowen TAN Jian HUANG Xiangguo School of Mechantronic Engineering,Wuhan University of Technology,Wuhan 430070,China, 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S3期788-791,共4页
An effective and reliable access control is crucial to a PDM system.This article has discussed the commonly used access control models,analyzed their advantages and disadvantages,and proposed a new Role and Object bas... An effective and reliable access control is crucial to a PDM system.This article has discussed the commonly used access control models,analyzed their advantages and disadvantages,and proposed a new Role and Object based access control model that suits the particular needs of a PDM system.The new model has been implemented in a commercial PDM system,which has demonstrated enhanced flexibility and convenience. 展开更多
关键词 PDM MANDATORY ACCESS control discretionary ACCESS control role BASED ACCESS control
下载PDF
The Research of Role Tree-Based Access Control Model
9
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 role Based Accessing control (RBAC) role Tree-Based Access control (RTBAC) Models Constraints Permission
下载PDF
A General Attribute and Rule Based Role-Based Access Control Model
10
作者 朱一群 李建华 张全海 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第6期719-724,共6页
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relatio... Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments. 展开更多
关键词 ATTRIBUTE RULE user-role ASSIGNMENT role-BASED ACCESS control(RBAC) ACCESS policy
下载PDF
Role of Time-Domain Based Access Control Model
11
作者 Chaoqun Liu Zhen Peng Lili Wu 《Journal of Software Engineering and Applications》 2016年第2期57-62,共6页
While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control rol... While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control roles. The basic idea of T-RBAC is introduced and described formally, and the safely of this model is analyzed. The research shows that T-RBAC fulfills both rules of information security, which are principle of least privilege and separation of duties. With practical application of T-RBCA, it can handle most of the time-related or authority-related problems. What’s more, it also increases the security level, flexibility and dynamic adaptation of the system and has lower complexity than system only handled by authority. This model also can solve conflicts caused by authority. 展开更多
关键词 TIME-DOMAIN role Access control RBCA
下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
12
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control RBAC(role-based access controd TRUST CACHE PMI (privilege management infrastructure)
下载PDF
Role of Soluble Factors in Immune and Normal Sera in the Control of Giardiasis Due to Giardia Iamblia
13
作者 R.K.SRIVASTAVA N.SETHI +1 位作者 N.GUPTA A.K.AGARWAL 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 1992年第2期87-91,共5页
Hyperimmune sera (HIS), raised against crude giardia antigen, on in vitro interaction, caused more agglutination of Giardia lamblia trophozoites. Heat inactivated HIS possessed a comparable agglutinating activity as t... Hyperimmune sera (HIS), raised against crude giardia antigen, on in vitro interaction, caused more agglutination of Giardia lamblia trophozoites. Heat inactivated HIS possessed a comparable agglutinating activity as the non-inactivated controls. Non-inactivated normal (unimmunized) serum caused immobilization of Giardia trophozoite, which was checked on heat inactivation. Antibodies in immune sera are mainly responsible for agglutination, whereas the heat labile non-immune components control the mobility of the intestinal parasite. 展开更多
关键词 role of Soluble Factors in Immune and Normal Sera in the control of Giardiasis Due to Giardia Iamblia
下载PDF
基于策略的动态角色分配模型及应用
14
作者 冯骐 马晨辉 《计算机与数字工程》 2024年第1期75-80,共6页
访问控制是应用系统中的重要问题之一。传统的基于角色的访问控制(RBAC)方案需要预先定义和同步用户-角色赋值关系,这会带来管理成本和同步开销,并且限制了应用系统的灵活性和动态性。文章提出一种基于策略的动态角色分配模型(Policy-ba... 访问控制是应用系统中的重要问题之一。传统的基于角色的访问控制(RBAC)方案需要预先定义和同步用户-角色赋值关系,这会带来管理成本和同步开销,并且限制了应用系统的灵活性和动态性。文章提出一种基于策略的动态角色分配模型(Policy-based Dynamic Role Assignment Model——PDRA),它无需同步用户就可以自定义角色,并通过策略匹配的方式实现动态分配。模型完全兼容RBAC,可以成为RBAC良好的扩展机制。文章给出了模型的定义和算法,评估了模型的性能,并在华东师范大学的数据治理平台中进行了应用,验证了该方案的可行性和有效性。 展开更多
关键词 访问控制 基于角色的访问控制 基于策略的动态角色分配模型 策略匹配算法 数据治理平台
下载PDF
兼职感控护士在病区感染防控中的作用
15
作者 李杨柳 韩娜 +1 位作者 曹立云 丁炎明 《中国护理管理》 CSCD 北大核心 2024年第1期5-8,共4页
文章介绍了国内外兼职感控护士的设立和发展,以及组织管理的现况。从促进感控措施落地、促进各类人员参与感控实践及影响组织文化和他人行为等角度阐述了兼职感控护士在病区感染防控中的作用,并总结了未来兼职感控护士的发展方向。
关键词 兼职感控护士 感染防控 病区 作用
下载PDF
基于RBAC模型的前后端分离系统设计与实现 被引量:1
16
作者 陈海锋 丘美玲 《科技创新与应用》 2024年第4期102-105,109,共5页
权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分... 权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分离技术能够很好地解决前端页面开发和后端服务器功能开发解耦的问题,让分工双方更加注重各自面对的业务问题,减少对开发人员技术门槛的要求,从而大大提高了开发效率。因此采用前后端分离技术实现通用的基于角色的访问控制系统具有一定的实用价值。 展开更多
关键词 基于角色的访问控制模型 前后端分离 访问控制 系统设计 数据库
下载PDF
ESG表现对财务风险影响的实证研究 被引量:1
17
作者 余国梦 宋利 《嘉兴学院学报》 2024年第3期93-98,共6页
基于2010—2021年A股上市公司的面板数据,采用计量经济方法就ESG表现对财务风险的影响进行实证研究。研究发现,ESG表现可显著降低企业财务风险,其中,内部控制和分析师的关注起完全中介作用,融资约束起到部分中介作用。另外,相比于国有企... 基于2010—2021年A股上市公司的面板数据,采用计量经济方法就ESG表现对财务风险的影响进行实证研究。研究发现,ESG表现可显著降低企业财务风险,其中,内部控制和分析师的关注起完全中介作用,融资约束起到部分中介作用。另外,相比于国有企业,非国有企业的ESG表现对降低财务风险的效应更大。基于此,企业应促进ESG发展以更好降低财务风险。 展开更多
关键词 ESG表现 财务风险 内部控制 融资约束 中介作用
下载PDF
基于角色和属性的零信任访问控制模型研究
18
作者 许盛伟 田宇 +2 位作者 邓烨 刘昌赫 刘家兴 《信息安全研究》 CSCD 北大核心 2024年第3期241-247,共7页
面对网络中大量涌现的安全威胁,传统访问控制模型暴露出权限分配动态性差、面对新威胁敏感度低以及资源分配复杂度高的问题.针对上述问题,提出一种基于角色和属性的零信任访问控制模型,模型使用逻辑回归的方法对访问主体进行信任评估,... 面对网络中大量涌现的安全威胁,传统访问控制模型暴露出权限分配动态性差、面对新威胁敏感度低以及资源分配复杂度高的问题.针对上述问题,提出一种基于角色和属性的零信任访问控制模型,模型使用逻辑回归的方法对访问主体进行信任评估,实现对访问主体属性高敏感度的访问控制,并采用一种全新的资源决策树,在实现访问控制更细粒度安全性的同时,降低了对资源权限分配的时间复杂度.最后,通过在典型应用场景下对模型进行验证,表明该模型在权限动态分配方面明显优于传统访问控制模型. 展开更多
关键词 零信任 角色 属性 访问控制 资源决策树
下载PDF
感恩与自我控制的关系:心理资本的中介作用
19
作者 沈佳华 张晓贤 孙晓玲 《心理技术与应用》 2024年第10期630-640,共11页
以大学生为研究对象,通过2个研究探讨感恩与自我控制之间的关系,及心理资本的中介作用。研究1采用问卷调查法,探究特质感恩与自我控制的关系,及心理资本的中介作用;研究2采用实验法,诱发被试的感恩情绪,探究状态感恩与自我控制的关系,... 以大学生为研究对象,通过2个研究探讨感恩与自我控制之间的关系,及心理资本的中介作用。研究1采用问卷调查法,探究特质感恩与自我控制的关系,及心理资本的中介作用;研究2采用实验法,诱发被试的感恩情绪,探究状态感恩与自我控制的关系,及心理资本的中介作用。结果发现:(1)在控制一般积极情绪后,心理资本在特质感恩与自我控制之间起部分中介作用;(2)与对照组相比,诱发状态感恩的大学生,其自我控制水平更高;(3)在控制一般积极情绪后,心理资本在状态感恩与自我控制之间起部分中介作用。因此感恩不仅直接预测自我控制,也可通过心理资本预测自我控制。 展开更多
关键词 特质感恩 状态感恩 自我控制 心理资本 中介作用
下载PDF
规范化管理在检验科医院感染的预防与控制中的运用探讨
20
作者 石庆衡 《中国标准化》 2024年第14期244-247,共4页
目的:评价规范化管理在检验科医院感染的预防与控制中的运用效果。方法:本次研究调查目标为黎平县人民医院检验科接受常规检查的患者样本,选择2021年2月—2022年4月收集的样本实施常规管理作为对照组,2022年5月—2023年11月收集的样本... 目的:评价规范化管理在检验科医院感染的预防与控制中的运用效果。方法:本次研究调查目标为黎平县人民医院检验科接受常规检查的患者样本,选择2021年2月—2022年4月收集的样本实施常规管理作为对照组,2022年5月—2023年11月收集的样本实施规范化管理为观察组,每组各收集样本500份,本次研究均由21名检验人员参与,对比两组感染控制效果。结果:观察组管理后的各指标合格率均明显高于对照组,其感染发生率比对照组低,差异有统计学意义(P<0.05);观察组管理后的各方面管理质量水平显著高于对照组,其职业暴露风险发生率明显低于对照组,统计差异有统计学意义(P<0.05)。结论:对检验科医院感染的预防实施规范化管理能显著提高感染控制率和样本的检验合格率,全面提升检验科的管理水平,降低医院职业暴露率,值得临床采纳。 展开更多
关键词 规范化管理 检验科 医院感染 预防与控制 管理作用
下载PDF
上一页 1 2 83 下一页 到第
使用帮助 返回顶部