期刊文献+
共找到282篇文章
< 1 2 15 >
每页显示 20 50 100
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing 被引量:3
1
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第4期50-63,共14页
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in... In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient. 展开更多
关键词 digital rights management cloud computing usage control attribute-based encryption homomorphic encryption
下载PDF
Vietnam’s Future Water Usage Model: A Controlled Living Experiment
2
作者 Kanako Toyosada Takayuki Otani +4 位作者 Yasutoshi Shimizu Hiroshi Takata Kazuhiko Sakamoto Saburo Murakawa Shunsuke Managi 《Journal of Water Resource and Protection》 2018年第2期204-214,共11页
The purpose of this study was to explore the water usage profile of future Vietnamese households by carrying out a controlled living experiment with Vietnamese high-income households. By studying showering time, flow ... The purpose of this study was to explore the water usage profile of future Vietnamese households by carrying out a controlled living experiment with Vietnamese high-income households. By studying showering time, flow rate and toilet-use frequency of these households, the study revealed the water usage believed to be representative of future households in light of continued urbanization. This study also determined that the average time of showering was 9.7 minutes per person per day with an average flow rate of 12 L/minute for the existing shower head and 6.6 L/minute for the water-saving shower head. Toilet usage frequency was 5.25 times per person per day, and there was no difference with the results for an average (middle-income) household. 展开更多
关键词 WATER-SAVING Equipment WATER usage controlLED LIVING EXPERIMENT VIETNAMESE Household
下载PDF
TrustControl:Trusted Private Data Usage Control Based on Security Enhanced TrustZone
3
作者 Hong Lei Jun Li +5 位作者 Suozai Li Ming Huang Jieren Cheng Yirui Bai Xinman Luo Chao Liu 《Computers, Materials & Continua》 SCIE EI 2022年第12期5687-5702,共16页
The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,indivi... The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,individuals are becoming increasingly concerned about data misuse and leaks.To address these issues,in this paper,we propose TrustControl,a trusted data usage control system to control,process,and protect data usage without revealing privacy.A trusted execution environment(TEE)is exploited to process confidential user data.First of all,we design a secure and reliable remote attestation mechanism for ARM TrustZone,which can verify the security of the TEE platform and function code,thus guaranteeing data processing security.Secondly,to address the security problem that the raw data may be misused,we design a remote dynamic code injection method to regulate that data can only be processed for the expected purpose.Our solution focuses on protecting the sensitive data of the data owner and the function code of the data user to prevent data misuse and leakage.Furthermore,we implement the prototype system of TrustControl on TrustZone-enabled hardware.Real-world experiment results demonstrate that the proposed Trust-Control is secure and the performance overhead of introducing our prototype system is very low. 展开更多
关键词 TRUSTZONE data usage control PRIVACY SECURITY
下载PDF
The Package Concept for Enforcing Usage Control
4
作者 Patricia Ghann Changda Wang Conghua Zhou 《Journal of Information Security》 2013年第2期67-72,共6页
Access and usage control is a major challenge in information and computer security in a distributed network connected environment. Many models have been proposed such as traditional access control and UCONABC. Though ... Access and usage control is a major challenge in information and computer security in a distributed network connected environment. Many models have been proposed such as traditional access control and UCONABC. Though these models have achieved their objectives in some areas, there are some issues both have not dealt with. The issue of what happens to a resource once it has been accessed rightfully. In view of this, this paper comes out with how to control resource usage by a concept known as the package concept. This concept can be implemented both with internet connection and without the internet connection to ensure continual control of resource. It packages the various types of resources with the required policies and obligations that pertain to the use of these different resources. The package concept of ensuring usage control focuses on resource by classifying them into three: Intellectual, sensitive and non-sensitive resources. Also this concept classifies access or right into three as: access to purchase, access to use temporally online and access to modify. The concept also uses biometric mechanism such as fingerprints for authentication to check redistribution of resource and a logic bomb to help ensure the fulfillment of obligations. 展开更多
关键词 Access control usage control Policies OBLIGATION User or Subject BIOMETRIC FINGER Print Logic BOMB Remote CLIENT
下载PDF
Assessing the Awareness and Usage of Quality Control Tools with Emphasis to Statistical Process Control (SPC) in Ethiopian Manufacturing Industries
5
作者 Leakemariam Berhe Tesfay Gidey 《Intelligent Information Management》 2016年第6期143-169,共27页
Introduction: The present work was devoted to assess the awareness and usage of quality control tools with the emphasis on statistical process control in Ethiopian manufacturing industries. Semi structured questionnai... Introduction: The present work was devoted to assess the awareness and usage of quality control tools with the emphasis on statistical process control in Ethiopian manufacturing industries. Semi structured questionnaire has been employed to executive and technical managers of manufacturing industries of various size and specialism across the country. Stratified random sample method by region was used to select sample industries for the study. The samples used for this study are industries mainly from Oromiya, Addis Ababa, Tigray, Amara, SNNP and Diredawa regions proportional to their size of the available industries. Methods: Exploratory method and descriptive statistics was used for data analysis. Available documents and reports related to quality control policy of the selected companies were investigated. Results and Discussions: The number of manufacturing industries involved in this study was 44. Of the sampled manufacturing industries about 60% are from Oromiya and Addis Ababa regions. It has been reported that 100% of the respondents said that the importance of quality control tools is very important to their organizations’ productivity and quality improvement (Figure 3). Quality control professionals were also asked the extent to which quality control system is working in their industry and majority of the respondents (45%) have indicated that quality control system is working to some extent in their respective industries (Figure 18). Conclusions and Recommendations: Most of the quality department of the industries did not fully recognize the importance of statistical process control as quality control tools. This is mainly due to lack of awareness and motivation of the top managements, shortage of man power in the area, and others together would make it difficult to apply quality control tools in their organization. In general, the industries in Ethiopia are deficient in vigor and found to be stagnant hence less exposed to a highly competitive market and don’t adopt the latest quality control techniques in order to gain knowledge about systems to improve quality and operational performance. We conclude that quality management system has to be established as an independent entity with a real power and hence the quality control department which is responsible for quality can make an irreversible decision with respect to quality of any given product. Moreover, the concerned bodies (government and ministry of industries) should give attention and work together with universities to ensure how these statistical process control techniques could be incorporated in a curriculum of the universities at higher levels in degree and masters programs. Furthermore, different trainings which could improve quality and efficiency of their respective management system should be given as short and long term to the employees including top and middle managers found in various industries relevant to their process. 展开更多
关键词 Quality Products AWARENESS usage Statistical Process control Ethiopia
下载PDF
Design of an Intelligent Usage Parameter Control in ATM Networks
6
作者 蒋智峰 《High Technology Letters》 EI CAS 1997年第1期59-62,共4页
This paper presents the principle of the fuzzy associate memory controlled leaky bucket (FAMLB) and several concepts for Usage Parameter Control (UPC) in ATM networks. The multiplex weight and random fuzzy rules adjus... This paper presents the principle of the fuzzy associate memory controlled leaky bucket (FAMLB) and several concepts for Usage Parameter Control (UPC) in ATM networks. The multiplex weight and random fuzzy rules adjustment method in the system architecture are introduced. The conclusions show that the FAMLB is a better dynamic method of UPC than the traditional ones. 展开更多
关键词 FUZZY ASSOCIATE Memory Leaky BUCKET (FAMLB) usage Parameter control (UPC) Multiplex Weight (MW) Random FUZZY Rules Adjustment Method(RFRAM)
下载PDF
Usage control mechanism for securing the multi-organizational grid
7
作者 MEI Yi-duo DONG Xiao-she GUAN Shang-yuan WANG Zhao ZHU Zheng-dong 《通讯和计算机(中英文版)》 2008年第10期1-5,共5页
关键词 通信技术 安全技术 安全管理 多组织网
下载PDF
DEVELOPMENT AND USAGE OF SIGNAL PR OCESSING AND SOUND SITIMULATING SYSTEM CONTROLLED BY COMPUTER
8
作者 Sun Wei,Li Xing-Qi,Jiang Si-Chang (Institute of Otolaryngology of PLA Department of Otolaryngology of General Hospital. Beijing, China) 《Chinese Journal of Biomedical Engineering(English Edition)》 1995年第2期103-104,共2页
In hearing physiological experiments and clinic tests,we need not only a signal processing system,but also a synchronous sound stimulator’ Most of stimulators we are now using are function generators which are indepe... In hearing physiological experiments and clinic tests,we need not only a signal processing system,but also a synchronous sound stimulator’ Most of stimulators we are now using are function generators which are independent to processing units,and can be controlled only by hand. Although some of them have ports through which they can be controlled by computer,but as they are designed for industrial aims,not for hearing research,most of them can’t generate the special waveforms we need. We use the TDT signal processing system and develop a software package have both usage. On the interface of the program we can control the sampling parameters and generate stimulating waveforms’ 展开更多
关键词 PR DEVELOPMENT AND usage OF SIGNAL PR OCESSING AND SOUND SITIMULATING SYSTEM controlLED BY COMPUTER
下载PDF
A Multi-Tenant Usage Access Model for Cloud Computing 被引量:1
9
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 Multi-tenant usage access control model cloud computing
下载PDF
Context-Aware Usage-Based Grid Authorization Framework
10
作者 CUI Yongquan HONG Fan FU Cai 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1736-1740,共5页
Due to inherent heterogeneity, multi-domain characteristic and highly dynamic nature, authorization is a critical concern in grid computing. This paper proposes a general authorization and access control architecture,... Due to inherent heterogeneity, multi-domain characteristic and highly dynamic nature, authorization is a critical concern in grid computing. This paper proposes a general authorization and access control architecture, grid usage control (GUCON), for grid computing. It's based on the next generation access control mechanism usage control (UCON) model. The GUCON Framework dynamic grants and adapts permission to the subject based on a set of contextual information collected from the system environments; while retaining the authorization by evaluating access requests based on subject attributes, object attributes and requests. In general, GUCON model provides very flexible approaches to adapt the dynamically security request. GUCON model is being implemented in our experiment prototype. 展开更多
关键词 CONTEXT-AWARE access control usage control ucon
下载PDF
考虑空域时空特性的动态多跑道使用策略优化方法
11
作者 朱承元 白锴迪 赵志刚 《交通信息与安全》 CSCD 北大核心 2024年第1期94-104,共11页
多跑道机场飞行区运行效率低下会导致空域-跑道系统容流供需失衡,进而造成终端区空域交通拥堵、航班延误现象频发。为提升多跑道机场终端区运行效率,借助全空域与机场模型软件(total airspace and airport modeler,TAAM)建立空域仿真模... 多跑道机场飞行区运行效率低下会导致空域-跑道系统容流供需失衡,进而造成终端区空域交通拥堵、航班延误现象频发。为提升多跑道机场终端区运行效率,借助全空域与机场模型软件(total airspace and airport modeler,TAAM)建立空域仿真模型,针对不同运行模式动态转换下对终端区交通流走向、扇区开合等空域时空特性的影响进行分析,提出1种考虑不同运行时段内终端区机场走廊口流量配比和进离港流量分布的动态多跑道使用策略优化方法。首先,使用TAAM综合考虑不同跑道运行模式下各扇区内航班流量、高度变更、移交协调及冲突解脱对管制负荷的影响,拟合得出不同跑道运行模式下基于当量航空器架次的各扇区管制负荷函数。以终端区内航班平均飞行时间、平均延误时间及管制员工作负荷为优化目标,建立了跑道使用策略优化模型。设计了1种基于航空器基本性能数据库(the base aircraft data,BADA)的多目标非支配排序遗传算法(NSGA-Ⅱ),并结合机场实际运行条件在无运行限制、运行方向限制、运行模式限制等5种场景下进行仿真计算。对各场景Pareto最优解集进行评价得出不同场景下最优跑道使用策略,并使用TAAM进行仿真对比验证。结果表明:无运行限制和运行方向限制相较于单一跑道运行模式的航班服务效率提升10.15%,5.01%;管制员工作负荷减少3.91%,3.4%;延误时间减少28.86%,19.46%。 展开更多
关键词 航空运输 空中交通管制 跑道使用策略 NSGA-II TAAM
下载PDF
基于角色和规则引擎的UCON应用模型 被引量:4
12
作者 熊智 徐江燕 +2 位作者 王高举 李江 蔡伟鸿 《计算机工程与设计》 CSCD 北大核心 2013年第3期831-836,共6页
UCON是一种基于属性的下一代访问控制模型,但其高度抽象,难于直接应用,为此提出了一种基于角色和规则引擎的UCON应用模型UCON-ABRR。该模型通过引入角色这一属性,便于实现基于角色的用户管理;并基于规则引擎来制定访问规则和实施访问控... UCON是一种基于属性的下一代访问控制模型,但其高度抽象,难于直接应用,为此提出了一种基于角色和规则引擎的UCON应用模型UCON-ABRR。该模型通过引入角色这一属性,便于实现基于角色的用户管理;并基于规则引擎来制定访问规则和实施访问控制策略,不仅支持UCON的两个重要特征:属性易变性和决策过程连续性,而且具有很好的可操作性。该模型具有通用性,将其应用于云存储场景中,达到了预期的访问控制效果。 展开更多
关键词 访问控制 使用控制 应用模型 角色 规则引擎 云存储
下载PDF
UCON_(onA)模型的安全研究 被引量:1
13
作者 翟志刚 毛宇光 王建东 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2010年第1期168-172,共5页
针对使用控制模型(UCON)中安全性异常复杂的问题,通过构造形式化模型的方法得出一些使用控制模型的安全结论,完成了关于授权中使用控制模型(UCONonA)的安全分析。针对使用控制模型中使用决策的持续性和属性易变性的特点,通过定义策略、... 针对使用控制模型(UCON)中安全性异常复杂的问题,通过构造形式化模型的方法得出一些使用控制模型的安全结论,完成了关于授权中使用控制模型(UCONonA)的安全分析。针对使用控制模型中使用决策的持续性和属性易变性的特点,通过定义策略、模式和转换状态的方法给出一个形式化UCONonA模型;通过分析得出一般的UCONonA模型的安全问题是不确定的结论;通过构造一个有限状态机模拟的方法证明对于具有有限属性域和没有创建策略的UCONonA模型在安全性上是确定的。 展开更多
关键词 访问控制 使用控制 授权 持续性 易变性
下载PDF
云环境下基于UCON的访问控制模型研究 被引量:5
14
作者 蔡婷 陈昌志 《计算机科学》 CSCD 北大核心 2014年第S1期262-264,共3页
UCON(Usage Control)访问控制模型,通过引入"义务"和"条件"两个概念,实现了传统访问控制模型、信任管理和数字版权管理3个技术领域的融合,扩展了模型的控制覆盖范围,能更好地应用于云计算环境。针对UCON模型的隐私... UCON(Usage Control)访问控制模型,通过引入"义务"和"条件"两个概念,实现了传统访问控制模型、信任管理和数字版权管理3个技术领域的融合,扩展了模型的控制覆盖范围,能更好地应用于云计算环境。针对UCON模型的隐私保护问题,提出了一种基于加密方式的授权管理控制模型——AM-UCON。该模型在认证和监控的基础上,以多方验证的方法来提高属性更新的可信性和授权的正确性,能在一定程度上抵制恶意篡改隐私策略信息的问题。最后给出该模型的实现过程,并在基于云计算的数字对象发布系统中予以实现。 展开更多
关键词 云环境 ucon 访问控制 授权管理 隐私策略
下载PDF
UCON_(ABC)模型中的委托授权方案研究 被引量:9
15
作者 李亚平 周伟良 《中国科学技术大学学报》 CAS CSCD 北大核心 2012年第2期154-160,共7页
在使用控制(usage control,UCON)核心模型UCONABC(usage control authorizations,obligations,conditions)中引入委托机制,对委托的粒度、深度、广度以及授权回收等问题进行研究,并通过划分主体属性,建立属性与权利的对应关系等方式,设... 在使用控制(usage control,UCON)核心模型UCONABC(usage control authorizations,obligations,conditions)中引入委托机制,对委托的粒度、深度、广度以及授权回收等问题进行研究,并通过划分主体属性,建立属性与权利的对应关系等方式,设计了新的带有委托授权特征的UCONABC模型,并给出两个具有委托授权特征的UCONABC子模型的形式化描述,最后,通过委托授权模型在数字资源访问控制中的一个应用实例,验证带有委托授权特征的UCONABC模型的有效性,并以此体现对于开放式环境中基于属主的委托授权问题的研究意义. 展开更多
关键词 使用控制 委托授权 属性 授权回收 开放式环境
下载PDF
一种新的UCON的数据仓库安全模型 被引量:3
16
作者 翟志刚 王建东 毛宇光 《小型微型计算机系统》 CSCD 北大核心 2011年第3期426-429,共4页
使用控制模型(UCON)是作为下一代访问控制模型被提出的,一经提出就得到了广泛研究,其应用范围也得到了极大扩展.数据仓库安全问题的核心之一是安全模型的建立,结合基于角色访问控制模型(RBAC)和使用控制模型(UCON)建立了一个新的数据仓... 使用控制模型(UCON)是作为下一代访问控制模型被提出的,一经提出就得到了广泛研究,其应用范围也得到了极大扩展.数据仓库安全问题的核心之一是安全模型的建立,结合基于角色访问控制模型(RBAC)和使用控制模型(UCON)建立了一个新的数据仓库安全模型RUCON.模型结构分为两部分,RBAC组件和UCON组件,管理安全、角色授权由RBAC组件负责,解决用户授权问题;客体权力、决策处理由UCON组件负责,解决属性易变性和访问持续性的问题. 展开更多
关键词 访问控制 RBAC ucon 数据仓库
下载PDF
吉林省复混肥料“产—销—用”现状调研与产业发展建议
17
作者 陈安吉 姜国壮 +2 位作者 侯文峰 高强 王寅 《中国土壤与肥料》 CAS CSCD 北大核心 2024年第3期218-228,共11页
采用抽样调查方法,2021—2022年对吉林省复混肥企业、不同地区的乡/镇肥料经销商和玉米种植户开展问卷调查,分别收到有效问卷20、85和255份,分析了“产—销—用”环节的产品类型、养分含量及群体特征,为区域化肥产业发展、农田减肥增效... 采用抽样调查方法,2021—2022年对吉林省复混肥企业、不同地区的乡/镇肥料经销商和玉米种植户开展问卷调查,分别收到有效问卷20、85和255份,分析了“产—销—用”环节的产品类型、养分含量及群体特征,为区域化肥产业发展、农田减肥增效提供参考。结果表明,40年来吉林省农业生产中复混肥投入量持续增加,目前肥料复合化率达70%,远超全国平均水平。总体上,吉林省复混肥企业的复合肥、掺混肥产品占比平均分别为46.1%和53.9%,具有缓/控释功能产品占比平均为51.6%。不同规模企业的产品类型差异明显,大中型企业以复合肥为主(占比分别为75.4%和58.9%),小型企业以掺混肥为主(占比85.5%),大、中、小型企业生产缓/控释肥的平均比例分别为21.7%、50.6%和74.8%。乡/镇肥料经销商销售的复混肥品牌大多在3~4个(占比55%),吉林省内肥料企业产品平均占比46.7%。复合肥、掺混肥平均销售比例分别为47.9%和52.1%,缓/控释肥平均销售比例为37.4%。玉米种植户采用一次性施肥方式的平均比例达76%,复合肥、掺混肥平均施用比例分别为43.6%和56.4%,缓/控释肥平均施用比例为42.7%。相比西部地区,中东部地区掺混肥、缓/控释肥的销售与使用比例明显更高。总养分含量45%~50%、含氮量≥25%的复混肥是吉林省生产、销售及施用的主要产品,小型企业的高氮肥产品占比更高,中东部地区总养分含量≥50%、含氮量≥25%的肥料售用比例也明显高于西部地区。肥料经销商和玉米种植户年龄主体分别为40~50和50~60岁,受教育程度分别以高中和初中学历为主,部分有较高学历的中青年经销商(38.8%)和农户(19.6%)认为控释肥材料可能存在环境污染风险。不同地区农户选购肥料首要的考虑因素均为肥料价格(占比24.9%),而后为肥料效果、肥料品牌和经销商宣传等。可见,目前掺混肥及高浓度、高含氮量肥料成为吉林省复混肥“产—销—用”主流产品,缓/控释产品比例大幅增加,建议未来从肥料立法、产品创新、优化营销和强化服务等方面进一步推进肥料行业转型、促进农业绿色发展。 展开更多
关键词 吉林省 复混肥料 缓/控释肥 肥料生产 肥料销售 肥料施用
下载PDF
基于UCON的网络银行在线支付及其安全性分析 被引量:2
18
作者 王昌达 董雪刚 周从华 《计算机工程与应用》 CSCD 2014年第16期90-94,共5页
通过分析现有网络银行在线支付特点及安全保护机制,发现其支付过程仍存在身份冒充、权限泄露和支付不灵活等问题。针对这些问题,提出使用控制模型UCON的网络银行在线支付模型,制定动态的授权规则和灵活的支付策略,并对提出的策略进行详... 通过分析现有网络银行在线支付特点及安全保护机制,发现其支付过程仍存在身份冒充、权限泄露和支付不灵活等问题。针对这些问题,提出使用控制模型UCON的网络银行在线支付模型,制定动态的授权规则和灵活的支付策略,并对提出的策略进行详细描述。通过使用模型检测工具NuSMV进行安全性分析,证明该策略符合网络银行访问控制的安全性和方便性需求,且能够弥补现有系统在身份认证机制和支付行为使用控制方面的不足。 展开更多
关键词 网络银行 访问控制 支付安全 使用控制 模型检测
下载PDF
基于UCON的分布式数据库安全模型 被引量:1
19
作者 翟志刚 王建东 《计算机工程》 CAS CSCD 北大核心 2011年第24期50-51,54,共3页
针对分布式数据库系统中已发布数据难以控制的问题,结合基于角色访问控制模型(RBAC)和使用控制模型(UCON)的特点,提出一种基于UCON的分布式数据库安全模型。将分布式数据库分为服务器端和客户端,服务器端采用UCON策略,客户端采用RBAC策... 针对分布式数据库系统中已发布数据难以控制的问题,结合基于角色访问控制模型(RBAC)和使用控制模型(UCON)的特点,提出一种基于UCON的分布式数据库安全模型。将分布式数据库分为服务器端和客户端,服务器端采用UCON策略,客户端采用RBAC策略。分析结果表明,该模型能有效控制分布式数据库系统中的数据。 展开更多
关键词 分布式数据库 访问控制 使用控制 易变性 持续性
下载PDF
短视频使用控制失败量表的编制及信效度检验
20
作者 毛峥 姜永志 杨伊生 《贵州师范大学学报(自然科学版)》 CAS 北大核心 2024年第6期91-96,103,共7页
编制适用于中国文化背景下的青少年短视频使用控制失败量表,并检验其信效度。结果显示:正式问卷为单因素,共6个项目,内部一致性系数为0.912,项目负荷在0.623~0.895之间,方差贡献率为58.047%;验证性因素分析显示,单因子模型拟合良好,χ^(... 编制适用于中国文化背景下的青少年短视频使用控制失败量表,并检验其信效度。结果显示:正式问卷为单因素,共6个项目,内部一致性系数为0.912,项目负荷在0.623~0.895之间,方差贡献率为58.047%;验证性因素分析显示,单因子模型拟合良好,χ^(2)/df=1.94,RMSEA=0.055,CFI=0.993,TLI=0.988,SRMR=0.017;问卷分半信度为0.965,30 d后重测信度为0.911。结论:研究编制的青少年短视频使用控制失败量表具有较好的心理测量学指标,可以用于中国青少年中短视频使用控制失败的研究。 展开更多
关键词 短视频使用控制失败 问卷编制 信度 效度 青少年
下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部