期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
对ADO数据访问控件效率的分析
1
作者 潘虎 《福建电脑》 2004年第1期33-34,共2页
Delphi支持包括ADO在内的多种数据访问技术,它提供了几个ADO数据访问控件。本文通过一个例子详细分析和比较了ADOTable,ADOQuery,ADOStoredProc这三种访问控件的数据访问效率,总结了分别在什么情况下使用这三种访问控件。同时找到了一... Delphi支持包括ADO在内的多种数据访问技术,它提供了几个ADO数据访问控件。本文通过一个例子详细分析和比较了ADOTable,ADOQuery,ADOStoredProc这三种访问控件的数据访问效率,总结了分别在什么情况下使用这三种访问控件。同时找到了一种研究同类开发平台数据访问效率的方法。 展开更多
关键词 ADO 数据访问控件 数据库 应用程序 数据访问效率
下载PDF
ADO.NET 2.0在数据库访问中的应用
2
作者 葛文涛 《舰船电子工程》 2009年第7期147-150,共4页
数据库访问技术一直是web应用程序和数据管理系统开发的重点和难点,ADO.NET 2.0为数据库开发提供了强大的理论和技术支持。介绍了ADO.NET 2.0的数据模型,研究了数据库的控件访问及编程访问方法和原理,阐述了ADO.NET 2.0的新增数据访问... 数据库访问技术一直是web应用程序和数据管理系统开发的重点和难点,ADO.NET 2.0为数据库开发提供了强大的理论和技术支持。介绍了ADO.NET 2.0的数据模型,研究了数据库的控件访问及编程访问方法和原理,阐述了ADO.NET 2.0的新增数据访问功能和机制并给出了DataTable的新增功能的应用实例。 展开更多
关键词 ADO.NET2.0 应用程序 数据管理系统 访问 编程访问
下载PDF
两类访问数据库编程方法的分析与比较
3
作者 杨滨 李久伟 《中国科技财富》 2010年第22期11-11,共1页
无论是信息管理系统,还是多媒体应用系统,都需要强大的数据库来支持,访问数据库则是应用程序必须具备的基本功能之一。Visual Basic 6.0提供了多种访问数据库的方法,包括数据控件、DAO(数据访问对象)、RDO(远程数据对象)、VBSQL以及... 无论是信息管理系统,还是多媒体应用系统,都需要强大的数据库来支持,访问数据库则是应用程序必须具备的基本功能之一。Visual Basic 6.0提供了多种访问数据库的方法,包括数据控件、DAO(数据访问对象)、RDO(远程数据对象)、VBSQL以及ADO(ActiveX Data Objects)等。本文分析比较了两类VB对数据库编程的常用方法,总结了各类方法在VB中对数据库编程的使用原则。 展开更多
关键词 Visual Basic 6.0数据访问接口接口对象法(API)数据法(Data)
下载PDF
改进的RBAC模型关系数据库的设计与实现
4
作者 朱广福 郎永祥 +1 位作者 王海滨 杨溯然 《电脑编程技巧与维护》 2009年第14期56-57,共2页
改进的RBAC模型是针对RBAC96模型在角色继承方面的不足而提出的。通过分析改进的RBAC模型并结合关系数据库的技术,构造一套角色权限管理模型,它易于理解、具有更强的可伸缩性,特别适合于在复杂的访问控件系统中应用。
关键词 RBAC模型 访问控件 角色权限 E—R模型
下载PDF
A role based coordination model in agent systems 被引量:2
5
作者 张亚英 尤晋元 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期555-561,共7页
Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents ne... Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents need interaction and communication to achieve their overall goal. Coordination technologies for the Internet typically are concerned with enabling interaction among agents and helping them cooperate with each other. At the same time, access control should also be considered to constrain interaction to make it harmless. Access control should be regarded as the security counterpart of coordination. At present, the combination of coordination and access control remains an open problem. Thus, we propose a role Dased coordination model with policy enforcement in agent application systems. In this model, coordination is combined with access control so as to fully characterize the interactions in agent systems. A set of agents interacting with each other for a common global system task constitutes a coordination group. Role based access control is applied in this model to prevent unauthorized accesses. Coordination policy is enforced in a distributed manner so that the model can be applied to the open distributed systems such as Internet. An Internet online auction system is presented as a case study to illustrate the proposed coordination model and finally the performance analysis of the model is introduced. 展开更多
关键词 COORDINATION ROLE access control policy enforcement
下载PDF
Dynamic Polling MAC Scheme Considering Emergency Access in WSNs Based on Priorities 被引量:3
6
作者 Pei Qingqi Chen Chen Xie Weiguang 《China Communications》 SCIE CSCD 2012年第4期45-54,共10页
In Wireless Sensor Networks(WSNs),polling can obviously improve the throughput and decrease average access delay by allocating bandwidth efficiently and reasonably.In this paper,a Dynamic Polling Media Access Control ... In Wireless Sensor Networks(WSNs),polling can obviously improve the throughput and decrease average access delay by allocating bandwidth efficiently and reasonably.In this paper,a Dynamic Polling Media Access Control (DPMAC) scheme designed according to WSNs' features is proposed.DPMAC is a priority based access control protocol with the characteristics that its polling table is dynamically refreshed depending on whether the sensor node is active and that the bandwidth is dynamically allocated according to the traffic types.The access priorities are determined by the emergency levels of events and the scheduler proposed in our MAC is preemptive based on the deadline of the events.Simulation results show that DPMAC can efficiently utilize bandwidth and decrease average access delay and response time for emergency events with different access priorities in WSNs. 展开更多
关键词 WSNS POLLING THROUGHPUT MAC
下载PDF
A Protective Mechanism for the Access Control System in the Virtual Domain 被引量:1
7
作者 Jinan Shen Deqing Zou +3 位作者 Hai Jin Kai Yang Bin Yuan Weiming Li 《China Communications》 SCIE CSCD 2016年第11期129-142,共14页
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ... In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved under the traditional framework if the operating system(OS) is comprised since malwares are running in ring 0 level. In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems. We separate the access control system into three parts: policy management(PM),security server(SS) and policy enforcement(PE). Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks. We add an access vector cache(AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain. The policy enforcement module is retained in the guest OS for performance. The security of AVC and PE can be ensured by using a memory protection mechanism. The goal of protecting the OS kernel is to ensure the security of the execution path. We implementthe system by a modified Xen hypervisor. The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter. Our system offers a centralized security policy for virtual domains in virtual machine environments.Keywords: hypervisor; virtualization; memo- 展开更多
关键词 HYPERVISOR VIRTUALIZATION memory protection guest OS access control system
全文增补中
上一页 1 下一页 到第
使用帮助 返回顶部