期刊文献+
共找到722篇文章
< 1 2 37 >
每页显示 20 50 100
Research on the Influence of Anchor Attributes on Consumers’Online Behaviors in Social E-Commerce Platforms:The Moderating Effect of Platform Contextual Factors
1
作者 Xiaodong Yang Gi Young Chung 《Proceedings of Business and Economic Studies》 2024年第5期186-193,共8页
As e-commerce continues to mature,the advantages of live streaming within the industry have become increasingly apparent,offering significant growth opportunities.Social e-commerce platforms,which are user-centered,in... As e-commerce continues to mature,the advantages of live streaming within the industry have become increasingly apparent,offering significant growth opportunities.Social e-commerce platforms,which are user-centered,integrate social networks with e-commerce by leveraging social interactions to drive product sales and enhance the overall consumer shopping experience.This type of e-commerce fosters engagement and promotes products by merging online communities with shopping behavior,creating a more interactive and dynamic marketplace.It not only retains the traditional e-commerce trading and marketing functions but also adds a social dimension,making live stream anchors crucial figures connecting consumers with products.These anchors can attract consumers with their appearance and charm,and use their expertise on live streaming platforms to guide consumers by recommending live content.They can also interact with their audiences and potentially influence them to purchase the recommended goods.It is evident that the attributes of anchors in live streaming rooms significantly impact consumers’online behavior.Therefore,researching how platform contextual factors regulate consumers’online behavior is of great practical significance.This study employs multilevel regression analysis to support its hypotheses using data.The findings indicate that contextual factors of the platform significantly influence online behavior,enhancing the positive relationship between user attachment and online activities. 展开更多
关键词 Anchor attribute user attachment Consumers’online behaviors Contextual factors
下载PDF
Frequent Itemset Mining of User’s Multi-Attribute under Local Differential Privacy 被引量:2
2
作者 Haijiang Liu Lianwei Cui +1 位作者 Xuebin Ma Celimuge Wu 《Computers, Materials & Continua》 SCIE EI 2020年第10期369-385,共17页
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ... Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets. 展开更多
关键词 Local differential privacy frequent itemset mining user’s multi-attribute
下载PDF
基于量子衍生涡流算法和T⁃S模糊推理模型的储层岩性识别
3
作者 赵娅 管玉 +1 位作者 李盼池 王伟 《石油地球物理勘探》 EI CSCD 北大核心 2024年第1期23-30,共8页
鉴于梯度下降法易陷入局部极值、普通群智能优化算法易早熟收敛,提出一种基于量子衍生涡流算法(Quantum Vortex Search Algorithm,QVSA)和T⁃S模糊推理模型的岩性识别方法,QVSA具有操作简单、收敛速度快、寻优能力强等优点,有助于T⁃S模... 鉴于梯度下降法易陷入局部极值、普通群智能优化算法易早熟收敛,提出一种基于量子衍生涡流算法(Quantum Vortex Search Algorithm,QVSA)和T⁃S模糊推理模型的岩性识别方法,QVSA具有操作简单、收敛速度快、寻优能力强等优点,有助于T⁃S模糊推理模型获得最优参数配置,从而实现储层岩性的准确识别。首先利用具有全局搜索能力的QVSA优化T⁃S模糊推理模型的各种参数;然后利用主成分分析方法降低获取的地震属性维度;再利用优化的T⁃S模糊推理模型识别储层岩性。实验结果表明,利用反映储层特征的8个地震属性识别储层岩性时,所提方法的识别正确率达到92%,比普通BP网络方法高5.1%,同时查准率、查全率、F1分数等指标也较BP网络方法提升明显。 展开更多
关键词 储层岩性识别 量子衍生涡流算法 T⁃s 模糊推理模型 模糊集 地震属性
下载PDF
基于XGBoost算法的v_(P)/v_(S)预测及其在储层检测中的应用
4
作者 田仁飞 李山 +1 位作者 刘涛 景洋 《石油地球物理勘探》 EI CSCD 北大核心 2024年第4期653-663,共11页
鄂尔多斯盆地碳酸盐岩地层蕴含着丰富的油气资源。在勘探实践中发现,大牛地气田马家沟组断层发育、断距小,类型多样且成因复杂,给勘探、开发带来了较多挑战。为了应对这些挑战,提高储层预测的精度变得至关重要。在分析大牛地气田敏感弹... 鄂尔多斯盆地碳酸盐岩地层蕴含着丰富的油气资源。在勘探实践中发现,大牛地气田马家沟组断层发育、断距小,类型多样且成因复杂,给勘探、开发带来了较多挑战。为了应对这些挑战,提高储层预测的精度变得至关重要。在分析大牛地气田敏感弹性参数的基础上,建立地震属性与储层纵横波速度比(v_(P)/v_(S))的关系,提出一种基于XGBoost算法的地震多属性v_(P)/v_(S)预测方法。为了进一步提升XGBoost算法的预测精度和泛化能力,采用贝叶斯算法对XGBoost算法的超参数进行优化,从而找到最佳的超参数组合,以确保模型在训练集和测试集上的性能均能得到提升。将XGBoost算法应用于Marmousi 2模型进行横波速度预测,预测值与实际值相关系数超过0.88,而均方误差、平均绝对百分比误差分别低于6.55×10^(-7)和4%,验证了该方法的准确性和可靠性。在鄂尔多斯盆地大牛地气田,应用该方法获得的v_(P)/v_(S)成功识别出含气储层,结果与实际钻井数据一致。理论模型和实际数据应用结果表明,XGBoost作为一种强大的机器学习算法预测精度较高,为直接由叠后地震属性预测v_(P)/v_(S)提供了一种有效的途径。 展开更多
关键词 横波速度 碳酸盐岩储层 地震属性 XGBoost算法 纵横波速度比(v_(P)/v_(s))
下载PDF
Customization Product Design Based on User's Emotion and Needs 被引量:3
5
作者 金纯 张春林 刘文枝 《Defence Technology(防务技术)》 SCIE EI CAS 2005年第2期245-249,共5页
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform... The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs. 展开更多
关键词 user’s needs product form CUsTOMIZATION fuzzy number
下载PDF
Use of methotrexate in inflammatory bowel disease in 2014: A User's Guide 被引量:4
6
作者 Arun Swaminath Raja Taunk Garrett Lawlor 《World Journal of Gastrointestinal Pharmacology and Therapeutics》 CAS 2014年第3期113-121,共9页
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo... Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients. 展开更多
关键词 METHOTREXATE Inflammatory BOWEL DIsEAsE Crohn’s DIsEAsE ULCERATIVE colitis IMMUNOMODULATORs METHOTREXATE user’s GUIDE
下载PDF
User’s Relevance of PIR System Based on Cloud Models 被引量:1
7
作者 康海燕 樊孝忠 《Journal of Beijing Institute of Technology》 EI CAS 2006年第2期181-185,共5页
A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method f... A new method to evaluate fuzzily user's relevance on the basis of cloud models has been proposed. All factors of personalized information retrieval system are taken into account in this method. So using this method for personalized information retrieval (PIR) system can efficiently judge multi-value relevance, such as quite relevant, comparatively relevant, commonly relevant, basically relevant and completely non-relevant, and realize a kind of transform of qualitative concepts and quantity and improve accuracy of relevance judgements in PIR system. Experimental data showed that the method is practical and valid. Evaluation results are more accurate and approach to the fact better. 展开更多
关键词 personalized information retrieval (PIR) cloud model users relevance fuzzy evaluation
下载PDF
Improved Attribute Chain Sampling Plan for Darna Distribution 被引量:1
8
作者 Harsh Tripathi Amer Ibrahim Al-Omari +1 位作者 Mahendra Saha Ayed R.A.Alanzi 《Computer Systems Science & Engineering》 SCIE EI 2021年第9期381-392,共12页
Recently,the Darna distribution has been introduced as a new lifetime distribution.The two-parameter Darna distribution represents is a mixture of two well-known gamma and exponential distributions.A manufacturer or a... Recently,the Darna distribution has been introduced as a new lifetime distribution.The two-parameter Darna distribution represents is a mixture of two well-known gamma and exponential distributions.A manufacturer or an engineer of products conducts life testing to examine whether the quality level of products meets the customer’s requirements,such as reliability or the minimum lifetime.In this article,an attribute modified chain sampling inspection plan based on the time truncated life test is proposed for items whose lifetime follows the Darna distribution.The plan parameters,including the sample size,the acceptance number,and the past lot result of the proposed sampling plan,are determined with the help of the two-point approach considering the acceptable quality level(AQL)and the limiting quality level(LQL).The plan parameters and the corresponding operating characteristic functions of a new plan are provided in tabular form for various Darna distribution parameters.Also,a few illustrated examples are presented for various distribution parameters.The usefulness of the proposed attribute modified chain sampling plan is investigated using two real failure time datasets.The results indicate that the proposed sampling plan can reduce the sample size when the termination ratio increases for fixed values of the producer’s risk and acceptance number.Hence,the proposed attribute modified chain sampling inspection plan is recommended to practitioners in the field. 展开更多
关键词 attribute chain sampling inspection plan consumer’s risk Darna distribution operating characteristic curve producer’s risk truncated life test
下载PDF
General Attribute Based RBAC Model for Web Services 被引量:3
9
作者 ZHU Yiqun LI Jianhua ZHANG Quanhai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第1期81-86,共6页
Growing numbers of users and many access policies that involve many different resource attributes in service-oriented environments cause various problems in protecting resource. This paper analyzes the relationships o... Growing numbers of users and many access policies that involve many different resource attributes in service-oriented environments cause various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes based on access policies for Web services, and proposes a general attribute based role-based access control(GARBAC) model. The model introduces the notions of single attribute expression, composite attribute expression, and composition permission, defines a set of elements and relations among its elements and makes a set of rules, assigns roles to user by inputing user's attributes values. The model is a general access control model, can support more granularity resource information and rich access control policies, also can be used to wider application for services. The paper also describes how to use the GARBAC model in Web services environments. 展开更多
关键词 attributE RULE user-role assignment role-based access control (RBAC) access policy
下载PDF
A Dynamic Bandwidth Allocation Solution Based on User Behavior and Software Defined EPS
10
作者 Bo Zhu Hao Jiang +2 位作者 Lihua Wu Shuwen Yi Hai Wang 《China Communications》 SCIE CSCD 2016年第9期80-90,共11页
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin... For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved. 展开更多
关键词 bandwidth utilization users behaviour traffic module sDN
下载PDF
Novel dynamic anti-collusion ciphertext policy attribute-based encryption scheme in 5G D2D environment
11
作者 Xu Xiangjie Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期251-257,共7页
To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption... To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage. 展开更多
关键词 device-to-device(D2D) attribute revocation user management dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE) access control
下载PDF
属性Logistic混沌映射下的物联网隐私数据安全共享 被引量:2
12
作者 黄杨杨 《现代电子技术》 北大核心 2024年第13期97-101,共5页
为加强物联网隐私数据保护,提高用户信任度与满意度,提出属性Logistic混沌映射下的物联网隐私数据安全共享。构建基于主从式结构的三层物联网隐私数据安全共享模型并设计数据访问机制,在此基础上,基于量子细胞神经网络和Logistic映射得... 为加强物联网隐私数据保护,提高用户信任度与满意度,提出属性Logistic混沌映射下的物联网隐私数据安全共享。构建基于主从式结构的三层物联网隐私数据安全共享模型并设计数据访问机制,在此基础上,基于量子细胞神经网络和Logistic映射得到矩阵A,对其分解后,得到矩阵B和序列C,由B矩阵构造混沌序列池,对C序列元素作映射处理,生成索引序列,并确定Logistic映射初始值,再对索引作Logistic映射后,从混沌序列池检索出CP-ABE加密算法的公钥、主密钥后,利用其与用户属性集合生成用户私钥,基于数据访问结构实现物联网隐私数据的加密。实验结果表明,该方法生成的密钥能够通过随机性验证,实现物联网隐私数据加密,且操作数量少,加密强度高。 展开更多
关键词 Logistic 混沌映射 物联网 隐私数据 主从式 访问机制 量子细胞神经网络 CP-ABE 用户属性
下载PDF
A General Attribute and Rule Based Role-Based Access Control Model
13
作者 朱一群 李建华 张全海 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第6期719-724,共6页
Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relatio... Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource.This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments. 展开更多
关键词 attributE RULE user-role AssIGNMENT ROLE-BAsED ACCEss control(RBAC) ACCEss policy
下载PDF
Method of Consistency Judgment for App Software’s User Comments
14
作者 Meng Ran Ying Jiang +1 位作者 Qixin Xiang Jiaman Ding 《国际计算机前沿大会会议论文集》 2016年第1期121-123,共3页
With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other ... With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective. 展开更多
关键词 social computing APP software The CONsIsTENCY of user COMMENT user’s COMMENT information user’s mark Featuresentiment-word-pairs Network sentiment WORD
下载PDF
Changes in the Structure of China's Net Users
15
《China's Foreign Trade》 2000年第5期44-44,共1页
关键词 Changes in the structure of China’s Net users
下载PDF
Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing
16
作者 Asma Alotaibi Ahmed Barnawi Mohammed Buhari 《Journal of Information Security》 2017年第3期203-222,共20页
Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provi... Fog computing is a concept that extends the paradigm of cloud computing to the network edge. The goal of fog computing is to situate resources in the vicinity of end users. As with cloud computing, fog computing provides storage services. The data owners can store their confidential data in many fog nodes, which could cause more challenges for data sharing security. In this paper, we present a novel architecture for data sharing in a fog environment. We explore the benefits of fog computing in addressing one-to-many data sharing applications. This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security. We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation. Keeping these issues in mind, we will secure data sharing in fog computing by combining attributebased encryption and proxy re-encryption techniques. Findings of this study indicate that our system has the response and processing time faster than classical cloud systems. Further, experimental results show that our system has an efficient user revocation mechanism, and that it provides high scalability and sharing of data in real time with low latency. 展开更多
关键词 attributE-BAsED Encryption FINE-GRAINED Access Control FOG COMPUTING PROXY Re-Encryption user REVOCATION
下载PDF
基于高阶多道同步挤压广义S变换的多属性融合储层预测技术研究及应用
17
作者 赵慧言 高欢 +2 位作者 严海滔 文冉 宋修艳 《海相油气地质》 CSCD 北大核心 2024年第2期207-214,共8页
时频域地震精细解释建立在高分辨率时频分析算法的基础上。为适应高精度勘探开发的要求,在多道同步挤压广义S变换(MSGST)的基础上,提出了高阶多道同步挤压广义S变换(HMSGST),进一步聚焦时频分辨率,提高储层预测的精准性。通过理论信号... 时频域地震精细解释建立在高分辨率时频分析算法的基础上。为适应高精度勘探开发的要求,在多道同步挤压广义S变换(MSGST)的基础上,提出了高阶多道同步挤压广义S变换(HMSGST),进一步聚焦时频分辨率,提高储层预测的精准性。通过理论信号、理论加噪信号对比6种时频算法的计算结果,验证了HMSGST具有高时频分辨率,对复杂信号具有更好的刻画能力。以某三维工区海相砂岩为例,基于HMSGST在时频域沿主要油气储层(T2层)提取时间切片,开展频率衰减梯度、分频相干等属性分析以增强对短轴河道、次级断裂等目标的识别能力和烃类检测能力,进一步结合曲率属性开展RGB多属性融合精细雕刻。对于不同工区、不同地质条件的地震数据,需要进行HMSGST的参数分析,适合的参数是达到更为准确的计算结果的前提。 展开更多
关键词 时频分析 高阶多道同步挤压广义s变换 时频分辨率 多属性融合 储层预测
下载PDF
B/S模式下OA系统的权限控制设计与实现 被引量:25
18
作者 宋维平 曾一 +2 位作者 涂争光 高旻 李颖 《计算机工程与应用》 CSCD 北大核心 2004年第35期199-201,210,共4页
通过分析现有权限控制模型,结合B/S模式的特征,论文提出了改进的权限控制模型,与在OA系统中的具体实现方法。
关键词 用户管理 权限控制模型 B/s模式 OA系统
下载PDF
Ground roll attenuation using a time-frequency dependent polarization filter based on the S transform 被引量:6
19
作者 谭玉阳 何川 +1 位作者 王艳冬 赵忠 《Applied Geophysics》 SCIE CSCD 2013年第3期279-294,358,共17页
The ground roll and body wave usually show significant differences in arrival time, frequency content, and polarization characteristics, and conventional polarization filters that operate in either the time or frequen... The ground roll and body wave usually show significant differences in arrival time, frequency content, and polarization characteristics, and conventional polarization filters that operate in either the time or frequency domain cannot consider all these elements. Therefore, we have developed a time-frequency dependent polarization filter based on the S transform to attenuate the ground roll in seismic records. Our approach adopts the complex coefficients of the S transform of the multi-component seismic data to estimate the local polarization attributes and utilizes the estimated attributes to construct the filter function. In this study, we select the S transform to design this polarization filter because its scalable window length can ensure the same number of cycles of a Fourier sinusoid, thereby rendering more precise estimation of local polarization attributes. The results of applying our approach in synthetic and real data examples demonstrate that the proposed polarization filter can effectively attenuate the ground roll and successfully preserve the body wave. 展开更多
关键词 Ground roll s transform spectral matrix polarization attributes polarization filter
下载PDF
一种基于树型结构的B/S系统权限控制方法 被引量:17
20
作者 李南妮 张璟 李军怀 《计算机应用研究》 CSCD 北大核心 2005年第10期128-130,共3页
在应用RBAC技术的基础上研究了基于树型结构下的B/S系统中权限控制方法,通过系统资源树的生成,提出了用户权限数据报的概念及其设计思想,并在实践中加以应用。实现了系统全局资源的安全访问控制,增加了系统的灵活性。
关键词 基于角色的访问控制 B/s 系统资源树 用户权限
下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部