期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Dual Focus upon Industrial Restructuring and Market Access Management
1
作者 张立群 《China Economist》 2007年第1期14-14,共1页
The Central Economic Working Conference of the CPC sets out an important mission for China’s economic development in 2007:"tak- ing energy conservation and protection of the ecological environment as the startin... The Central Economic Working Conference of the CPC sets out an important mission for China’s economic development in 2007:"tak- ing energy conservation and protection of the ecological environment as the starting point,actively promote optimization and upgrade of the industrial structure". 展开更多
关键词 Dual Focus upon Industrial Restructuring and Market access management HIGH
下载PDF
Application of Access Management Techniques to Large Shopping Mall in Beijing
2
作者 Baiming Ding Xiaokuan Yang 《World Journal of Engineering and Technology》 2016年第3期30-39,共11页
Conflicts are common phenomena in the field of traffic engineering, while are also the main cause of all the traffic problems. The vehicle access driveway of large shopping mall is often the conflict area of urban roa... Conflicts are common phenomena in the field of traffic engineering, while are also the main cause of all the traffic problems. The vehicle access driveway of large shopping mall is often the conflict area of urban roads, traffic engineers and city managers face a great challenge as to make the traffic enter and exit the shopping mall safely and or-derly. This paper studies the issues of access management of large shopping mall with a focus on Carrefour shopping mall in Shuangjin district, Beijing. This shopping mall attracts and generates lots of traffic during peak hours, those huge numbers of vehicles come in and out of the shopping mall through the access driveway, resulting in a lot of conflicts to the urban road traffic flow and deteriorating highly smooth movement of traffic on the urban roadway. The impacts of the existing design and layout of access driveway on surrounding traffic operation are also studied in this paper. Some countermeasure of improvements had proposed to decrease traffic conflicts and make sure that the traffic conditions get better off, all the improvement countermeasures are based on the access management principles. Results from this study can be a good reference on other similar driveways at large shopping mall areas. 展开更多
关键词 Large Shopping Mall Traffic Conflicts Driveway access management
下载PDF
The Application of Access Management in Commercial Area
3
作者 Siqi Gao Xiaokuan Yang 《World Journal of Engineering and Technology》 2016年第3期51-59,共9页
With the rapid development of automobile ownership and roadway network in China, there is more and more travel demand in the city of Beijing, China. Large commercial areas attract high volumes of traffic, which greatl... With the rapid development of automobile ownership and roadway network in China, there is more and more travel demand in the city of Beijing, China. Large commercial areas attract high volumes of traffic, which greatly impacts traffic movement on roadways, producing congestion and safety problems. What is more serious is that existing design of the parking lot, the location of access, layout of driveway, and passage of circulation are not desirable, causing potential conflicts and traffic delays. This paper mainly investigates the impact of the existing design of parking lot and layout of access and driveways at commercial areas around intersection in Beijing. The overall goal of this study is to use access management technologies to find out the measures for commercial area to improve roadway safety and operational efficiency. Some measures of improvements are proposed based on the analysis, including addition of right turn lanes, increase of driveway throat length and incorporation of traffic signs to guide on-site circulation. To accomplish the study objective, a total of 10 commercial areas around intersection were selected and some necessary data were collected at access points including traffic volume of each access and the frontage roadways during peak hours, access type, location, and spacing. The field investigations were conducted for 2 weekends for each area. Meanwhile, the peak hours were 10:00 to 12:00 a.m. on weekends. The data from field investigations show that the number and location of the access is different from place to place. Access driveway is closely located at the signalized intersection mostly. Other problems are also observed based on field investigation such as shortage of the access spacing. The result of this study can be a reference for traffic management on other similar areas in Beijing. 展开更多
关键词 access management COMMERCIAL PARKING
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
4
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 Information Technology (IT) Identity and access management (IAM) Saviynt User Identities access Privileges Authentication Processes Risk management
下载PDF
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
5
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期1-14,共14页
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi... The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition. 展开更多
关键词 Google Cloud Platform (GCP) Identity and access management (IAM) Saviynt User Identities access Privileges Authentication Processes
下载PDF
Manageable Fast Handover at Access Point in WLAN
6
作者 Gao YinLi Jie(Mobile Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2007年第1期42-45,共4页
The handover speed is always vital for the further development of Wireless Local Area Network (WLAN), which is enjoying a fast growth. Based on the handover technology specified in IEEE 802.11 WLAN, Manageable Fast Ha... The handover speed is always vital for the further development of Wireless Local Area Network (WLAN), which is enjoying a fast growth. Based on the handover technology specified in IEEE 802.11 WLAN, Manageable Fast Handover (MFHO) mechanism is proposed to speed up handover at the Access Point (AP), meet handover demands of services with different Quality of Service (QoS), and ensure service continuity. Adopting a handover policy named 'Make-before-break', this mechanism enables wireless APs to control and manage handover between two stations based on improving Inter-Access Point Protocol (IAPP). Tests have been carried out to compare functions and performance of MFHO and IAPP-based handover technology. The test results prove that MFHO provides a higher successful handover ratio and better handover performance than IAPP-based handover technology. 展开更多
关键词 Manageable Fast Handover at access Point in WLAN access AP
下载PDF
Weed-Suppressing Effect and Mechanism of Allelopathic Rice Accessions
7
作者 HUFei KONGChui-hua +2 位作者 XUXiao-hua ZHANGChao-xian CHENXiong-hui 《Agricultural Sciences in China》 CAS CSCD 2004年第8期590-597,共8页
Two allelopathic rice accessions, PI312777 and Allelopathy1, significantly suppressedthe growth of associated weeds in the field. Moreover, their weed-suppressing effectswere correlated with the cultivation patterns. ... Two allelopathic rice accessions, PI312777 and Allelopathy1, significantly suppressedthe growth of associated weeds in the field. Moreover, their weed-suppressing effectswere correlated with the cultivation patterns. The weed-suppressing effects of throwingand transplanting were more effective than that of direct seeding. Furthermore, theamounts of allelochemicals (resorcinols, flavones and hydroxamic acids) produced andreleased from two allelopathic rice accessions were much higher than that from a non-allelopathic rice variety Hua-Jing-Xian1, and reached the maximum concentration at the6th leaf stage. Differences in the weed-suppressing effects of rice accessions appear toresult from the accessions producing and releasing different amounts of allelochemicalsin the field. Further research confirmed that in PI312777 plants, allelochemicals weresynthesized by the above-ground parts, and then secreted through the root tissues. Roottissues of PI312777 plants never produced the allelochemicals. Root exudates fromPI312777 could significantly inhibit the growth of E. crus-galli surrounding rice plantsin water culture. However, when activated carbon was added to the culture solution, whichcould absorb allelochemicals from root exudates, the growth of E. crus-galli was nolonger significantly inhibited. Weed-suppressing effects of rice accessions depended onallelopathy, cultivation patterns and other factors in rice fields, while allelopathywas one of important factors. Interestingly, the amounts of allelochemicals produced andreleased from allelopathic rice plants may be induced by the presence of E. crus-galli.This suggests that there is a possible chemical recognition between rice and E. crus-galli. 展开更多
关键词 Rice (Oryza sativa L.) Allelopathic accession Allelochemical Weed management Root exudates Cultivated patterns
下载PDF
基于VB6.0的克拉玛依中心城区园林绿地管护信息系统开发与应用 被引量:1
8
作者 孙爱霞 尹林克 +1 位作者 罗强勇 张君艳 《新疆农业科学》 CAS CSCD 2008年第3期535-540,共6页
根据克拉玛依的气候、土壤、水资源等环境条件,以VB6.0为开发工具,结合Mapinfo及其组件MapX连接Access数据库开发克拉玛依中心城区园林绿地管护信息系统,实现了园林绿地信息的GIS管理和管护信息技术和基本资料的动态查询。
关键词 城市园林绿地 信息查询系统 VB6.0 access
下载PDF
Identity Governance Framework for Privileged Users
9
作者 Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期995-1005,共11页
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo... Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world. 展开更多
关键词 Privileged access management(PAM) lightweight directory access protocol(LDAP) identity management access control cyber-attack
下载PDF
Cloud authorization: exploring techniques and approach towards effective access control framework 被引量:3
10
作者 Rahat MASOOD Muhammad Awais SHIBLI Yumna GHAZI Ayesha KANWAL Arshad ALI 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期297-321,共25页
Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main probl... Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main problems in this regard is that of authorization in the Cloud environment, which is the focus of our research. In this paper, we present a systematic analysis of the existing authorization solutions in Cloud and evaluate their effectiveness against well-established industrial standards that conform to the unique access control require- ments in the domain. Our analysis can benefit organizations by helping them decide the best authorization technique for deployment in Cloud; a case study along with simulation re- sults is also presented to illustrate the procedure of using our qualitative analysis for the selection of an appropriate tech- nique, as per Cloud consumer requirements. From the results of this evaluation, we derive the general shortcomings of the extant access control techniques that are keeping them from providing successful authorization and, therefore, widely adopted by the Cloud community. To that end, we enumer- ate the features an ideal access control mechanisms for the Cloud should have, and combine them to suggest the ultimate solution to this major security challenge - access control as a service (ACaaS) for the software as a service (SaaS) layer. We conclude that a meticulous research is needed to incorpo- rate the identified authorization features into a generic ACaaS framework that should be adequate for providing high level of extensibility and security by integrating multiple accesscontrol models. 展开更多
关键词 AUTHORIZATION access control software as a ser-vice extensible access control markup language identity access management cloud security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部