Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi...The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition.展开更多
Conflicts are common phenomena in the field of traffic engineering, while are also the main cause of all the traffic problems. The vehicle access driveway of large shopping mall is often the conflict area of urban roa...Conflicts are common phenomena in the field of traffic engineering, while are also the main cause of all the traffic problems. The vehicle access driveway of large shopping mall is often the conflict area of urban roads, traffic engineers and city managers face a great challenge as to make the traffic enter and exit the shopping mall safely and or-derly. This paper studies the issues of access management of large shopping mall with a focus on Carrefour shopping mall in Shuangjin district, Beijing. This shopping mall attracts and generates lots of traffic during peak hours, those huge numbers of vehicles come in and out of the shopping mall through the access driveway, resulting in a lot of conflicts to the urban road traffic flow and deteriorating highly smooth movement of traffic on the urban roadway. The impacts of the existing design and layout of access driveway on surrounding traffic operation are also studied in this paper. Some countermeasure of improvements had proposed to decrease traffic conflicts and make sure that the traffic conditions get better off, all the improvement countermeasures are based on the access management principles. Results from this study can be a good reference on other similar driveways at large shopping mall areas.展开更多
The Central Economic Working Conference of the CPC sets out an important mission for China’s economic development in 2007:"tak- ing energy conservation and protection of the ecological environment as the startin...The Central Economic Working Conference of the CPC sets out an important mission for China’s economic development in 2007:"tak- ing energy conservation and protection of the ecological environment as the starting point,actively promote optimization and upgrade of the industrial structure".展开更多
With the rapid development of automobile ownership and roadway network in China, there is more and more travel demand in the city of Beijing, China. Large commercial areas attract high volumes of traffic, which greatl...With the rapid development of automobile ownership and roadway network in China, there is more and more travel demand in the city of Beijing, China. Large commercial areas attract high volumes of traffic, which greatly impacts traffic movement on roadways, producing congestion and safety problems. What is more serious is that existing design of the parking lot, the location of access, layout of driveway, and passage of circulation are not desirable, causing potential conflicts and traffic delays. This paper mainly investigates the impact of the existing design of parking lot and layout of access and driveways at commercial areas around intersection in Beijing. The overall goal of this study is to use access management technologies to find out the measures for commercial area to improve roadway safety and operational efficiency. Some measures of improvements are proposed based on the analysis, including addition of right turn lanes, increase of driveway throat length and incorporation of traffic signs to guide on-site circulation. To accomplish the study objective, a total of 10 commercial areas around intersection were selected and some necessary data were collected at access points including traffic volume of each access and the frontage roadways during peak hours, access type, location, and spacing. The field investigations were conducted for 2 weekends for each area. Meanwhile, the peak hours were 10:00 to 12:00 a.m. on weekends. The data from field investigations show that the number and location of the access is different from place to place. Access driveway is closely located at the signalized intersection mostly. Other problems are also observed based on field investigation such as shortage of the access spacing. The result of this study can be a reference for traffic management on other similar areas in Beijing.展开更多
The handover speed is always vital for the further development of Wireless Local Area Network (WLAN), which is enjoying a fast growth. Based on the handover technology specified in IEEE 802.11 WLAN, Manageable Fast Ha...The handover speed is always vital for the further development of Wireless Local Area Network (WLAN), which is enjoying a fast growth. Based on the handover technology specified in IEEE 802.11 WLAN, Manageable Fast Handover (MFHO) mechanism is proposed to speed up handover at the Access Point (AP), meet handover demands of services with different Quality of Service (QoS), and ensure service continuity. Adopting a handover policy named 'Make-before-break', this mechanism enables wireless APs to control and manage handover between two stations based on improving Inter-Access Point Protocol (IAPP). Tests have been carried out to compare functions and performance of MFHO and IAPP-based handover technology. The test results prove that MFHO provides a higher successful handover ratio and better handover performance than IAPP-based handover technology.展开更多
Two allelopathic rice accessions, PI312777 and Allelopathy1, significantly suppressedthe growth of associated weeds in the field. Moreover, their weed-suppressing effectswere correlated with the cultivation patterns. ...Two allelopathic rice accessions, PI312777 and Allelopathy1, significantly suppressedthe growth of associated weeds in the field. Moreover, their weed-suppressing effectswere correlated with the cultivation patterns. The weed-suppressing effects of throwingand transplanting were more effective than that of direct seeding. Furthermore, theamounts of allelochemicals (resorcinols, flavones and hydroxamic acids) produced andreleased from two allelopathic rice accessions were much higher than that from a non-allelopathic rice variety Hua-Jing-Xian1, and reached the maximum concentration at the6th leaf stage. Differences in the weed-suppressing effects of rice accessions appear toresult from the accessions producing and releasing different amounts of allelochemicalsin the field. Further research confirmed that in PI312777 plants, allelochemicals weresynthesized by the above-ground parts, and then secreted through the root tissues. Roottissues of PI312777 plants never produced the allelochemicals. Root exudates fromPI312777 could significantly inhibit the growth of E. crus-galli surrounding rice plantsin water culture. However, when activated carbon was added to the culture solution, whichcould absorb allelochemicals from root exudates, the growth of E. crus-galli was nolonger significantly inhibited. Weed-suppressing effects of rice accessions depended onallelopathy, cultivation patterns and other factors in rice fields, while allelopathywas one of important factors. Interestingly, the amounts of allelochemicals produced andreleased from allelopathic rice plants may be induced by the presence of E. crus-galli.This suggests that there is a possible chemical recognition between rice and E. crus-galli.展开更多
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo...Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.展开更多
Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main probl...Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main problems in this regard is that of authorization in the Cloud environment, which is the focus of our research. In this paper, we present a systematic analysis of the existing authorization solutions in Cloud and evaluate their effectiveness against well-established industrial standards that conform to the unique access control require- ments in the domain. Our analysis can benefit organizations by helping them decide the best authorization technique for deployment in Cloud; a case study along with simulation re- sults is also presented to illustrate the procedure of using our qualitative analysis for the selection of an appropriate tech- nique, as per Cloud consumer requirements. From the results of this evaluation, we derive the general shortcomings of the extant access control techniques that are keeping them from providing successful authorization and, therefore, widely adopted by the Cloud community. To that end, we enumer- ate the features an ideal access control mechanisms for the Cloud should have, and combine them to suggest the ultimate solution to this major security challenge - access control as a service (ACaaS) for the software as a service (SaaS) layer. We conclude that a meticulous research is needed to incorpo- rate the identified authorization features into a generic ACaaS framework that should be adequate for providing high level of extensibility and security by integrating multiple accesscontrol models.展开更多
Due to the new situation of continuous expansion of scientific and technological resources in universities and the urgent demand for hardware resources for science and technology innovation it is imperative to strengt...Due to the new situation of continuous expansion of scientific and technological resources in universities and the urgent demand for hardware resources for science and technology innovation it is imperative to strengthen the construction of large-scale instrument service platforms and open access management.It is not only the requirements for the development of instrument service platforms,but also the resources for science and technology of society.In the present paper,we first summarized the current equipment management,open access and major experience,then raised the problems in the construction and management process on the basis of the large instrument platform construction and open access management regulations,and finally proposed countermeasures for these problems:increasing funding input,streamlining the management system,improving the performance evaluation mechanism,and strengthening the management and operation team construction,etc.Collectively,this paper provided reference and enlightenment for the construction and open access management of similar large-scale instrument platforms.展开更多
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition.
文摘Conflicts are common phenomena in the field of traffic engineering, while are also the main cause of all the traffic problems. The vehicle access driveway of large shopping mall is often the conflict area of urban roads, traffic engineers and city managers face a great challenge as to make the traffic enter and exit the shopping mall safely and or-derly. This paper studies the issues of access management of large shopping mall with a focus on Carrefour shopping mall in Shuangjin district, Beijing. This shopping mall attracts and generates lots of traffic during peak hours, those huge numbers of vehicles come in and out of the shopping mall through the access driveway, resulting in a lot of conflicts to the urban road traffic flow and deteriorating highly smooth movement of traffic on the urban roadway. The impacts of the existing design and layout of access driveway on surrounding traffic operation are also studied in this paper. Some countermeasure of improvements had proposed to decrease traffic conflicts and make sure that the traffic conditions get better off, all the improvement countermeasures are based on the access management principles. Results from this study can be a good reference on other similar driveways at large shopping mall areas.
文摘The Central Economic Working Conference of the CPC sets out an important mission for China’s economic development in 2007:"tak- ing energy conservation and protection of the ecological environment as the starting point,actively promote optimization and upgrade of the industrial structure".
文摘With the rapid development of automobile ownership and roadway network in China, there is more and more travel demand in the city of Beijing, China. Large commercial areas attract high volumes of traffic, which greatly impacts traffic movement on roadways, producing congestion and safety problems. What is more serious is that existing design of the parking lot, the location of access, layout of driveway, and passage of circulation are not desirable, causing potential conflicts and traffic delays. This paper mainly investigates the impact of the existing design of parking lot and layout of access and driveways at commercial areas around intersection in Beijing. The overall goal of this study is to use access management technologies to find out the measures for commercial area to improve roadway safety and operational efficiency. Some measures of improvements are proposed based on the analysis, including addition of right turn lanes, increase of driveway throat length and incorporation of traffic signs to guide on-site circulation. To accomplish the study objective, a total of 10 commercial areas around intersection were selected and some necessary data were collected at access points including traffic volume of each access and the frontage roadways during peak hours, access type, location, and spacing. The field investigations were conducted for 2 weekends for each area. Meanwhile, the peak hours were 10:00 to 12:00 a.m. on weekends. The data from field investigations show that the number and location of the access is different from place to place. Access driveway is closely located at the signalized intersection mostly. Other problems are also observed based on field investigation such as shortage of the access spacing. The result of this study can be a reference for traffic management on other similar areas in Beijing.
文摘The handover speed is always vital for the further development of Wireless Local Area Network (WLAN), which is enjoying a fast growth. Based on the handover technology specified in IEEE 802.11 WLAN, Manageable Fast Handover (MFHO) mechanism is proposed to speed up handover at the Access Point (AP), meet handover demands of services with different Quality of Service (QoS), and ensure service continuity. Adopting a handover policy named 'Make-before-break', this mechanism enables wireless APs to control and manage handover between two stations based on improving Inter-Access Point Protocol (IAPP). Tests have been carried out to compare functions and performance of MFHO and IAPP-based handover technology. The test results prove that MFHO provides a higher successful handover ratio and better handover performance than IAPP-based handover technology.
基金supported by the National Natural Science Foundation of China(30070130)the Natural Science Foundation of Guangdong Province,China(021045)+1 种基金National Key Technologies R&D Program in the Tenth Five-Year of China(2001BA509B07)the Scientific Fund for Scholars Returning Overseas of Ministry of Education,China(2001-498).
文摘Two allelopathic rice accessions, PI312777 and Allelopathy1, significantly suppressedthe growth of associated weeds in the field. Moreover, their weed-suppressing effectswere correlated with the cultivation patterns. The weed-suppressing effects of throwingand transplanting were more effective than that of direct seeding. Furthermore, theamounts of allelochemicals (resorcinols, flavones and hydroxamic acids) produced andreleased from two allelopathic rice accessions were much higher than that from a non-allelopathic rice variety Hua-Jing-Xian1, and reached the maximum concentration at the6th leaf stage. Differences in the weed-suppressing effects of rice accessions appear toresult from the accessions producing and releasing different amounts of allelochemicalsin the field. Further research confirmed that in PI312777 plants, allelochemicals weresynthesized by the above-ground parts, and then secreted through the root tissues. Roottissues of PI312777 plants never produced the allelochemicals. Root exudates fromPI312777 could significantly inhibit the growth of E. crus-galli surrounding rice plantsin water culture. However, when activated carbon was added to the culture solution, whichcould absorb allelochemicals from root exudates, the growth of E. crus-galli was nolonger significantly inhibited. Weed-suppressing effects of rice accessions depended onallelopathy, cultivation patterns and other factors in rice fields, while allelopathywas one of important factors. Interestingly, the amounts of allelochemicals produced andreleased from allelopathic rice plants may be induced by the presence of E. crus-galli.This suggests that there is a possible chemical recognition between rice and E. crus-galli.
基金the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No.R-2021-150.
文摘Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world.
文摘Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main problems in this regard is that of authorization in the Cloud environment, which is the focus of our research. In this paper, we present a systematic analysis of the existing authorization solutions in Cloud and evaluate their effectiveness against well-established industrial standards that conform to the unique access control require- ments in the domain. Our analysis can benefit organizations by helping them decide the best authorization technique for deployment in Cloud; a case study along with simulation re- sults is also presented to illustrate the procedure of using our qualitative analysis for the selection of an appropriate tech- nique, as per Cloud consumer requirements. From the results of this evaluation, we derive the general shortcomings of the extant access control techniques that are keeping them from providing successful authorization and, therefore, widely adopted by the Cloud community. To that end, we enumer- ate the features an ideal access control mechanisms for the Cloud should have, and combine them to suggest the ultimate solution to this major security challenge - access control as a service (ACaaS) for the software as a service (SaaS) layer. We conclude that a meticulous research is needed to incorpo- rate the identified authorization features into a generic ACaaS framework that should be adequate for providing high level of extensibility and security by integrating multiple accesscontrol models.
文摘Due to the new situation of continuous expansion of scientific and technological resources in universities and the urgent demand for hardware resources for science and technology innovation it is imperative to strengthen the construction of large-scale instrument service platforms and open access management.It is not only the requirements for the development of instrument service platforms,but also the resources for science and technology of society.In the present paper,we first summarized the current equipment management,open access and major experience,then raised the problems in the construction and management process on the basis of the large instrument platform construction and open access management regulations,and finally proposed countermeasures for these problems:increasing funding input,streamlining the management system,improving the performance evaluation mechanism,and strengthening the management and operation team construction,etc.Collectively,this paper provided reference and enlightenment for the construction and open access management of similar large-scale instrument platforms.