The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By analyzing the traditional discretionary access control (DAC) and role-based access control (RBAC), a novel unified model which is a combination of RBAC and DAC nested within each other is proposed. The outer layer of the model is traditional RBAC management mechanism, and the internal control is a DAC construction based on RBAC2. Besides, the formal description and application examples are also...
When the amount of data into the database is growing, data query efficiency will drop, data space will be too large. To address this issue, this paper analyzes a data warehouse engine infobright. After quantitative analysis and comparison of common engine with MySQL, experiments show its characteristics, showing that the proposed infobright engine to adapt to such a data environment. In the experimental...
Almost all the websites and content management systems provided full-text search. The developer and customer always focus on the full-text search module during the process of develop and maintain the website and content management system. In order to meet the demands of customers for the full-text search capability, we must study the existing Chinese tokenizer. This article will examine four kinds...
With the characteristics of open source, excellent index structure and system architecture, Lucene promotes the application of full-text retrieval technology in various industries and fields greatly. In this paper, the system architecture and operational mechanism of Lucene were discussed. Further, according to the requirement of external network information leakage monitoring and querying system,...
In order to solve the security and privacy problems of low-cost RFID, in which only 250-3k logic gates can be devoted to security-related tasks. Many protocols have recently appeared, but all of them use traditional cryptographic primitives, which is unsuitable for low-cost tags. Some other proposals use non-cryptographic operations such as XOR and CRC, which have disadvantages in at least one aspect...
Low-cost Radio Frequency Identification (RFID) tags are highly resource and computational power limited, so that it can not support strong cryptography. To solve the security and privacy of low-cost RFID system, many schemes have appeared, but most of them are based on classical cryptographic primitives such as Pseudorandom Number Generators, hash functions, and block ciphers. A new approach is necessary...
Access authentication is one of the secure issues which are eager to be resolved in wireless mesh networking. This paper proposes new wireless mesh network authentication architecture based on threshold signature technology. First, we point out the weakness of single authentication server and the security risks of traditional AAA authentication method. Then we design a new authentication system with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.