期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
Least Privileges and Role’s Inheritance of RBAC 被引量:3
1
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 role-based access control least privileges role's inheritance
下载PDF
Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-MarkovModel 被引量:2
2
作者 ZHONG An-ming 1, JIA Chun-fu 1,21.College of Information Technology and Sciences, Nankai University, Tianjin 300071,China 2.State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Science, Beijing 100039,China 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期137-141,共5页
A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusi... A privilege flow oriented intrusion detection method based on HSMM (Hidden semi-Markov Model) is discussed. The privilege flow model and HSMM are incorporated in the implementation of an anomaly detection IDS (Intrusion Detection System). Using the dataset of DARPA 1998, our experiment results reveal good detection performance and acceptable computation cost. 展开更多
关键词 Key words intrusion detection privilege flow model HSMM
下载PDF
Effect of Vasocation Intestinal Peptide on Immune Privilege of the Rat Testis 被引量:1
3
作者 Wei WANG Ye-bin XI Guang-jie CHEN Jing HAO Bao-guo WANG Tian-wei SHEN Li-hua JIANG Wei-yi LI 《Journal of Reproduction and Contraception》 CAS 2008年第1期1-8,共8页
Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the ex... Objective To study the effect of vasocation intestinal peptide (VIP) on immune privilege of the rat testis. Methods The UU infected SD rats and Leydig cells were intervened by VIP, the secretion of TGF-β and the expression of FasL in rat Leydig cells were compared between VIP-intervened group and control group to test the effect of VIP on immune privilege of the rat testis in vitro and in vivo. Results In vitro, the secretion of TGF-β in Leydig cells could be increased by low dosage of VIP while inhibitited by high dosage of VIP; expression of FasL mRNA in Leydig cells could be decreased by VIP In vivo, increased expression of TGF-β mRNA and decreased FasL mRNA were observed in VIP group in 2-3 weeks after infected by UU. In addition, the apoptosis of Jurkat cells mediated by Leydig cells could be prevented by VIP Conclusion When Leydig cells or testis infected by UU, VIP could regulate the immune function of rat Leydig cells and participate in the regulation of immune privilege of testis through the regulation of TGF-β secretion and FasL expression pattern of Leydig cells. 展开更多
关键词 vasocation intestinal peptide (VIP) Leydig cell FASL TFG-β immune privilege
下载PDF
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
4
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control RBAC(role-based access controd TRUST CACHE PMI privilege management infrastructure)
下载PDF
Use and Abuse of Privileged Information in Italian Listed Companies
5
作者 Annalisa Baldissera 《Chinese Business Review》 2019年第1期14-29,共16页
Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The ... Privileged information has significant importance to listed companies, given both the extent of the markets in which it is used and the relevant effects that it can produce on the prices of financial instruments. The term “privileged information” means information that has not yet been made known to the public, which, if disclosed, is able to affect significantly the prices of the securities of listed issuers. This article aims to prove that in many cases, the effects of privileged information can be adequately represented in financial statements, despite their “confidential” nature. For this purpose, this research proposes the existence of a relationship—which can be virtuous or vicious—between financial statements and privileged information. In order to demonstate this thesis, the author carried out an empirical survey concerning both the economic and the legal sector. For the first one, the research considered the price-sensitive information published by companies listed on the Italian Stock Exchange during the first half of 2018, and the result shows that a lot of privileged information is able to generate accounting effects;for the second one, the empirical survey analyzed some significant judgments passed by the Italian Court of Cassation in the 2000s which confirm the companies’ violation of the duty to present privileged information in financial statements. 展开更多
关键词 privileged INFORMATION FINANCIAL statements LISTED COMPANIES
下载PDF
Identity Governance Framework for Privileged Users
6
作者 Mansour Hammoud Alruwies Shailendra Mishra Mohammed Abdul Rahman AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期995-1005,共11页
Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and passwo... Information technology companies have grown in size and recognized the need to protect their valuable assets.As a result,each IT application has its authentication mechanism,and an employee needs a username and password.As the number of applications increased,as a result,it became increasingly complex to manage all identities like the number of usernames and passwords of an employee.All identities had to be retrieved by users.Both the identities and the access rights associated with those identities had to be protected by an administrator.Management couldn’t even capture such access rights because they couldn’t verify things like privacy and security.Identity management can help solve this problem.The concept behind identity management is to centralize identity management and manage access identity centrally rather than multiple applications with their authentication and authorization mechanisms.In this research work,we develop governance and an identity management framework for information and technology infrastructures with privileged access management,consisting of cybersecurity policies and strategies.The results show the efficiency of the framework compared to the existing information security components.The integrated identity and access management and privileged access management enable organizations to respond to incidents and facilitate compliance.It can automate use cases that manage privileged accounts in the real world. 展开更多
关键词 privileged access management(PAM) lightweight directory access protocol(LDAP) identity management access control cyber-attack
下载PDF
恢复原始设定的Re-pair Privileges Utility 1.0
7
《电子与金系列工程信息》 2002年第7期9-9,共1页
关键词 苹果公司 REPAIR privileges Utility1.0 系统需求 警告讯息
下载PDF
Genius Is Not a Privilege of the Few
8
作者 LI CHAOCHEN and HOU RUILI 《China Today》 1996年第10期28-29,共2页
GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYw... GeniusIsNotaPrivilegeoftheFewRadicalwaystoboostone'sbrainpower.BystaffreportersLICHAOCHENandHOURUILIHOWMANYwordsoutof35givent... 展开更多
关键词 Genius Is Not a privilege of the Few
下载PDF
Chinese-Language Software-A Privilege for Chinese
9
作者 YANG TAOYUAN 《China Today》 1994年第10期61-62,共2页
Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chin... Since China has had more than 10 years of experience in the tech-nology for Chinese-language com-puter systems,one American firm,Microsoft,has started cooperation with Chinese software manufachur-ers to develop a Chinese edition of Windows 4.0.Microsoft will also support the Legend Group in devel-oping the Chinese edition of DOS 6.0,a new system that will hopeful-ly be on computer store shelves be-fore very long. 展开更多
关键词 Chinese-Language Software-A privilege for Chinese
下载PDF
Farmers' Privilege under the Protection of New Plant Varieties
10
作者 YANG De-xing Department of Human Sciences,Suzhou Polytechnic Institute of Agriculture,Suzhou 215008,China 《Asian Agricultural Research》 2012年第7期86-88,共3页
This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analy... This paper studies farmers'privilege under the protection of new plant varieties,and points out that farmers'privilege is given to balance interests of plant breeders and relevant public.Based on this,it analyzes shortcomings of farmers'privilege regulations,and puts forward that it is required to improve farmers'privilege regulations in subjects,objects and contents of rights on the basis of learning from advanced legislation experience of foreign countries,and build the interest sharing mechanism between breeders and farmers. 展开更多
关键词 PROTECTION of NEW PLANT VARIETIES Farmers’privileg
下载PDF
Logical Image Acquisition and Analysis of Android Smartphones
11
作者 Nursel Yalçın Tayfun Yıldırım 《Journal of Computer and Communications》 2024年第4期139-152,共14页
Android smartphones largely dominate the smartphone market. For this reason, it is very important to examine these smartphones in terms of digital forensics since they are often used as evidence in trials. It is possi... Android smartphones largely dominate the smartphone market. For this reason, it is very important to examine these smartphones in terms of digital forensics since they are often used as evidence in trials. It is possible to acquire a physical or logical image of these devices. Acquiring physical and logical images has advantages and disadvantages compared to each other. Creating the logical image is done at the file system level. Analysis can be made on this logical image. Both logical image acquisition and analysis of the image can be done by software tools. In this study, the differences between logical image and physical image acquisition in Android smartphones, their advantages and disadvantages compared to each other, the difficulties that may be encountered in obtaining physical images, which type of image contributes to obtaining more useful and effective data, which one should be preferred for different conditions, and the benefits of having root authority are discussed. The practice of getting the logical image of the Android smartphones and making an analysis on the image is also included. Although root privileges are not required for logical image acquisition, it has been observed that very limited data will be obtained with the logical image created without root privileges. Nevertheless, logical image acquisition has advantages too against physical image acquisition. 展开更多
关键词 Android Smartphone Forensics Data Acquisition Data Analysis Root privileges Digital Forensics
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
12
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 Information Technology (IT) Identity and Access Management (IAM) Saviynt User Identities Access privileges Authentication Processes Risk Management
下载PDF
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
13
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期1-14,共14页
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi... The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition. 展开更多
关键词 Google Cloud Platform (GCP) Identity and Access Management (IAM) Saviynt User Identities Access privileges Authentication Processes
下载PDF
Testicular defense systems: immune privilege and innate immunity 被引量:11
14
作者 Shutao Zhao Weiwei Zhu +1 位作者 Shepu Xue Daishu Han 《Cellular & Molecular Immunology》 SCIE CAS CSCD 2014年第5期428-437,共10页
The mammalian testis possesses a special immunological environment because of its properties of remarkable immune privilege and effective local innate immunity. Testicular immune privilege protects immunogenic germ ce... The mammalian testis possesses a special immunological environment because of its properties of remarkable immune privilege and effective local innate immunity. Testicular immune privilege protects immunogenic germ cells from systemic immune attack, and local innate immunity is important in preventing testicular microbial infections. The breakdown of local testicular immune homeostasis may lead to orchitis, an etiological factor of male infertility. The mechanisms underlying testicular immune privilege have been investigated for a long time. Increasing evidence shows that both a local immunosuppressive milieu and systemic immune tolerance are involved in maintaining testicular immune privilege status. The mechanisms underlying testicular innate immunity are emerging based on the investigation of the pattern recognition receptor-mediated innate immune response in testicular cells. This review summarizes our current understanding of testicular defense mechanisms and identifies topics that merit further investigation. 展开更多
关键词 immune privilege innate immunity TESTIS
原文传递
A new formal model for privilege control with supporting POSIX capability mechanism 被引量:3
15
作者 JIQingguang QINGSihan HEYeping 《Science in China(Series F)》 2005年第1期46-66,共21页
关键词 formal model least privilege ROLE DOMAIN capability.
原文传递
Learning with privileged information using Bayesian networks 被引量:1
16
作者 Shangfei WANG Menghua HE +3 位作者 Yachen ZHU Shan HE Yue LIU Qiang JI 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期185-199,共15页
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged ... For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged information, can be exploited during training to construct a better classifier. In this paper, we propose a Bayesian network (BN) approach for learning with privileged information. We propose to in- corporate the privileged information through a three-node BN. We further mathematically evaluate different topologies of the three-node BN and identify those structures, through which the privileged information can benefit the classifica- tion. Experimental results on handwritten digit recognition, spontaneous versus posed expression recognition, and gender recognition demonstrate the effectiveness of our approach. 展开更多
关键词 Bayesian network privileged information clas-sification maximum likelihood estimation
原文传递
Mechanisms of testicular immune privilege
17
作者 Tao WANG Xueying FENG Daishu HAN 《Frontiers in Biology》 CSCD 2011年第1期19-30,共12页
The testis exhibits a distinctive form of immune privilege to protect the germ cells from the host immuneattack. The property of testicular immune privilege was originally attributed to the blood-testis barrier in the... The testis exhibits a distinctive form of immune privilege to protect the germ cells from the host immuneattack. The property of testicular immune privilege was originally attributed to the blood-testis barrier in theseminiferous epithelium, which sequesters antigens. Recent studies have uncovered several levels of immune controlbesides the blood-testis barrier involved in the privilege of the testis, including the mechanisms of immune tolerance,reduced immune activation, localized active immunosuppression and antigen-specific immunoregulation. The somaticcells of the testis, especially Sertoli cells, play a key role in regulating the testicular immune privileged status. Theconstitutive expression of anti-inflammatory factors in the testis by somatic cells is essential for local immunosuppression.Growing evidence shows that androgens orchestrate the inhibition of proinflammatory factors and shift cytokinebalance toward a tolerogenic environment. Disruption of these protective mechanisms, which may be caused by trauma,infection and genetic factors, can lead to orchitis and infertility. This review article highlights the unique immuneenvironment of the testis, particularly focuses on the regulation of testicular immune privilege. 展开更多
关键词 immune privilege TESTIS IMMUNOREGULATION SPERMATOGENESIS
原文传递
Abusing National Privilege
18
《Beijing Review》 2011年第9期34-34,共1页
As U.S. mortgage finance giants-Fannie Mae and Freddie Mac-try to sell their huge backlog of foreclosed homes, they face foreclosures themselves as the U.S. Government contemplates cutting their government-backed supp... As U.S. mortgage finance giants-Fannie Mae and Freddie Mac-try to sell their huge backlog of foreclosed homes, they face foreclosures themselves as the U.S. Government contemplates cutting their government-backed support as indicated by a white paper issued by the Obama administration in February. Zhang Monan, an associate research fellow with the State Information Center, said the downfall of Fannie Mae and Freddie Mac is the result of abuses of privileges the two companies have enjoyed since their inception. 展开更多
关键词 MAC Abusing National privilege
原文传递
MEMBER PRIVILEGES——Each of the Shanghai Cooperation Organization members finds its own national interests served within the regional organization
19
作者 SIDOROV OLEG 《Beijing Review》 2006年第24期20-21,共2页
Facing common security threats, leaders of six countries-Russia, China, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan-established the Shanghai Cooperation Organization in June 2001 to maintain regional stability a... Facing common security threats, leaders of six countries-Russia, China, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan-established the Shanghai Cooperation Organization in June 2001 to maintain regional stability and security, fight terrorism and extremism, prevent conflicts and enhance economic cooperation. The SCO's primary goals are economic cooperation and fighting terrorism. 展开更多
关键词 SCO Ky ORGANIZATION MEMBER privilegeS Each of the Shanghai Cooperation Organization members finds its own national interests served within the regional organization
原文传递
Obligation-based Theory vs.Right-based Theory:Confrontation of Ideas Between Warrender and Strauss
20
作者 唐学亮 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1134-1150,共17页
There is a transition from the objective laws or moral orders that precede human will in classical natural law to the subjective demands or rights emanating from human will in modern natural law,and it represents a hi... There is a transition from the objective laws or moral orders that precede human will in classical natural law to the subjective demands or rights emanating from human will in modern natural law,and it represents a historical debate on the shift from an obligation-based theory to a right-based theory.Strauss,within the context of this transition across time,assesses Thomas Hobbes's philosophy of law and recognizes him as the founder of modern natural rights theory.Using Wesley Newcomb Hohfeld's analysis of jurisprudence,Howard Warrender assesses the privilege nature of Hobbes's concept of natural rights and concludes that,since Hohfeld's privilege is the opposite of obligation and related to no-right,obligations cannot be derived from natural rights.Therefore,Warrender argues that Strauss's assertion requires correction.However,Warrender places excessive emphasis on Hohfeld's static separation of the concept of privilege within his theoretical system,overlooking the dynamic transformation from privilege to claim rights.In this regard,Hobbesian scholar Carlan's criticism of Warrender is valid.Meanwhile,Warrender's research holds theoretical significance in that he,under the premise of being a part of Hobbes'natural law tradition,transforms Hohfeld's flat,two-party legal rights relationships into a three-party legal rights structure,which could represent a potential innovation in the 20^(th)century legal philosophy. 展开更多
关键词 OBLIGATION nature rights privilege Warrender Strauss
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部