The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer basic teaching aims to develop and improve the quality of students' computer literacy, to have proficiency in computer application skills for students. Therefore, we must oriente to people, individualize students, we must combinatie the computer basic education and professional education. In this paper, we combined the actual condition of xinjiang agricultural vocational college with its...
Security bootstrap is important to the platform security. If the bootstrap is not secure, Rootkits, Viruses and Trojan horses may be loaded into kernel, thus the following defenses built on the compromised kernel may be useless. In this paper, a trusted-computing based security bootstrap is introduced. We modify trust chain defined by Trusted Computing Group slightly by introducing a new component...
Numbers of proposals to incorporate delegation into secure service management have been seen the last years. How to assure that only the authorized users can fulfill specify services is one of the main problems for secure service management. Delegation is a mechanism that permits a user to assign a subset of his/her assigned authorizations to other users who currently do not possess the authorization...
In a secure workflow system, it is imperative to specify which users (or roles) can be authorized to execute which specific tasks. Users may also be able to delegate their rights of executing a task to others. Much of research work in the area of delegation has been carried out. In this paper, we provide a new formal method for representing delegation constraints in secure workflow systems, by adding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.