首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
测绘学   3篇
大气科学   1篇
海洋学   1篇
  2017年   1篇
  2016年   1篇
  2013年   1篇
  2010年   1篇
  2005年   1篇
排序方式: 共有5条查询结果,搜索用时 0 毫秒
1
1.
2.
针对TCG委托机制中存在的使用已失效的委托信息仍能获得TPM服务的安全问题,提出了一种基于m叉哈希树MHT的委托方案。MHT存储在平台中,叶节点记录当前有效委托的哈希值,子节点连接后计算哈希值构成父节点,如此递归产生根节点存储在TPM中。创建或撤销委托时,添加或删除MHT相应的叶节点,同步更新MHT内部节点直到根节点;执行委托时,查询MHT,判断委托当前是否合法有效,避免TPM中的资源被非法利用。实验结果表明,新的委托方案具有更高的安全性,且容易实现。  相似文献   
3.
The fisheries management policy shift towards resource user participation in Malawi in the early 1990s resulted in mixed benefits among small-scale fishers, with many applauding the changes. This paper considers the impacts of these policy changes on government and within the fishing communities around Lake Chiuta whose fisheries co-management experience is considered successful. Benefits to the communities range from gaining government support in excluding non-local fishers using destructive fishing gear to increased household incomes and improved livelihoods, while benefits to government range from taking credit for establishing a sustainable fishery and co-management arrangements to reduced resource management costs. Community costs include financial resources and time spent by resource user representative organisations in enforcing fishing regulations. These findings enable a more balanced assessment of neoliberal claims about the benefits of delegating management responsibilities and downloading costs of management onto fishing communities and organisations.  相似文献   
4.
Access control in multi-domain environments is one of the important questions of building coalition between domains. On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization. Then, a distributed RBAC model is presented. Finally the implementation issues are discussed.  相似文献   
5.
Access control in multi-domain environments is one of the important questions of building coalition between domains. On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization. Then, a distributed RBAC model is presented. Finally the implementation issues are discussed.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号