期刊文献+
共找到700篇文章
< 1 2 35 >
每页显示 20 50 100
Spatial distribution characteristics of national protected areas in China 被引量:6
1
作者 XU Baicui PAN Jinghu 《Journal of Geographical Sciences》 SCIE CSCD 2019年第12期2047-2068,共22页
This paper investigated spatial structures of 3418 national protected areas(NPAs)grouped into 13 types using GIS and quantitative analysis,including point patterns,Ripley’s K function,hotspot clustering,quadrat analy... This paper investigated spatial structures of 3418 national protected areas(NPAs)grouped into 13 types using GIS and quantitative analysis,including point patterns,Ripley’s K function,hotspot clustering,quadrat analysis,and Gini coefficient.Spatial accessibility was calculated for all NPAs from matrix raster data using cost weighted distance on the Arc GIS platform.The results are as follows:(1)The NNI of NPAs is 0.515,Gini is 0.073,all of which indicates distribution was shown to be a spatially dependent agglomeration,and more balanced in the provinces.The national key parks and the national water conservancy scenic spots had present the strongest aggregation,with NNI of 0.563 and 0.561 respectively,and K index indicates reducing aggregation when distance exceeds 600 km.(2)The national forest parks account for the largest proportion of 22.87% of all NPAs,and the world biosphere reserves the least of 0.77%.The number of NPAs in Shandong with 240 had been the largest one in all the provinces,while Tianjin had the least number including 9 NPAs.(3)There is only one hot spot in the first-class zone,5 in the second-class zones,and 51 in the third-class zones,which indicates NPAs are also aggregated at microscopic scales.(4)The hotspot NPA regions were mainly concentrated in the middle and lower reaches of the Yellow and Yangtze rivers,east of 100°E.High density of NPAs were generally in flat,water-rich,broad-leaved forest dominated plains and low mountain areas,with fertile soil,pleasant weather,long cultural history,and high transportation accessibility.(5)Average NPA accessible time is 60.05 min,with 70.76%regions being within 60 min,and the furthest was 777 min.The distribution of accessibility was positively related to the traffic lines.Interdepartmental protectionism has meant the various departments developed different management systems,standards,and technical specifications. 展开更多
关键词 protected areas SPATIAL structure accessIBILITY NATIONAL PARK system ECOLOGICAL CIVILIZATION
原文传递
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
2
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
在线阅读 下载PDF
Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division 被引量:4
3
作者 Wenyan Liu Xiangyang Luo +3 位作者 Yimin Liu Jianqiang Liu Minghao Liu Yun Q.Shi 《Computers, Materials & Continua》 SCIE EI 2018年第4期71-93,共23页
Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(No... Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security inspection.However,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight),the existing methods for localization indoor Wi-Fi access points based on RSS ranging tend to have lower accuracy as the RSS(Received Signal Strength)is difficult to accurately measure.Therefore,the localization algorithm of indoor Wi-Fi access points based on the signal strength relative relationship and region division is proposed in this paper.The algorithm hierarchically divide the room where the target Wi-Fi AP is located,on the region division line,a modified signal collection device is used to measure RSS in two directions of each reference point.All RSS values are compared and the region where the RSS value has the relative largest signal strength is located as next candidate region.The location coordinate of the target Wi-Fi AP is obtained when the localization region of the target Wi-Fi AP is successively approximated until the candidate region is smaller than the accuracy threshold.There are 360 experiments carried out in this paper with 8 types of Wi-Fi APs including fixed APs and portable APs.The experimental results show that the average localization error of the proposed localization algorithm is 0.30 meters,and the minimum localization error is 0.16 meters,which is significantly higher than the localization accuracy of the existing typical indoor Wi-Fi access point localization methods. 展开更多
关键词 wi-fi access points indoor localization RSS signal strength relative relationship region division.
在线阅读 下载PDF
A Protective Mechanism for the Access Control System in the Virtual Domain 被引量:1
4
作者 Jinan Shen Deqing Zou +3 位作者 Hai Jin Kai Yang Bin Yuan Weiming Li 《China Communications》 SCIE CSCD 2016年第11期129-142,共14页
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ... In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved under the traditional framework if the operating system(OS) is comprised since malwares are running in ring 0 level. In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems. We separate the access control system into three parts: policy management(PM),security server(SS) and policy enforcement(PE). Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks. We add an access vector cache(AVC) between SS and PE in the vip OS,in order to speed up communication between the vip OS and the security domain. The policy enforcement module is retained in the vip OS for performance. The security of AVC and PE can be ensured by using a memory protection mechanism. The goal of protecting the OS kernel is to ensure the security of the execution path. We implementthe system by a modified Xen hypervisor. The result shows that we can secure the security of the access control system in the vip OS with no overhead compared with modules in the latter. Our system offers a centralized security policy for virtual domains in virtual machine environments.Keywords: hypervisor; virtualization; memo- 展开更多
关键词 HYPERVISOR VIRTUALIZATION memory protection vip OS access control system
在线阅读 下载PDF
Spatial Pattern and Development of Protected Areas in the North-south Transitional Zone of China 被引量:1
5
作者 LI Xiang MA Beibei +2 位作者 LU Chunxia YANG He SUN Mengyu 《Chinese Geographical Science》 SCIE CSCD 2021年第1期149-166,共18页
The north-south transitional zone in China mainly consists of the Qinling-Daba Mountains. It is the most important West-East geo-ecological space in China, containing protected areas vital for biodiversity conservatio... The north-south transitional zone in China mainly consists of the Qinling-Daba Mountains. It is the most important West-East geo-ecological space in China, containing protected areas vital for biodiversity conservation and ecological security of China. The protection and rational development of its natural habitat is of great significance to China’s ecological security and integration of protected areas based on mountain forest ecosystems on a global scale. In this study, five important types of protected areas in the transitional zone were selected, and their spatial patterns were analysed. Spatial analysis methods, such as kernel density estimation and accessibility analysis, were employed for both point and areal data, and focused on four aspects: land use scale, shift in the centre of gravity, spatial agglomeration, and accessibility. In addition, policy background and evolution of spatial and temporal characteristics of the protected area system in the transitional zone from 1963 to 2017 were also examined. We analysed the characteristics and geographical significance of the West-east corridor using the spatial pattern of the protected area system from the perspective of ecological and economic spaces. We focused on spatial shape, type intersection, and key areas to analyse the spatial overlap of the protected areas. Protected area establishment was divided into three stages: initial(1956–1980), rapid development(1981–2013), and national park transformation(2014–present). These stages reflected the change in the concept of ‘simple protection—sustainable use—integration and upgrade’ for protected areas of China. The spatial centre of gravity of the protection zone system was located in the west Qinling-Daba Mountains, and its high-density core exhibited a relatively stable N-shaped structure composed of four gathering areas. Affected by factors such as geographic environment and socio-economic development density, the average access time for protected areas was high(1.56 h);wetland parks and scenic areas are located closer to the city centre. As the West-east corridor in the transitional zone extends from west to east, there is a clear spatial dislocation between the development of protected areas and the intensity of human activities. During development, differentiated goal orientation should be adopted based on the idea of zoning and classified governance. With the advancement of the construction of protected areas, the spatial overlap of protected areas in the transition zone has become more prominent. At present, the spatially overlapped protected areas in the transitional zone remain prominent, with inclusion overlap being the most common, and forest parks exhibiting the highest probability of overlap with other protected areas, we should focus on in the integration process of the corridor-type ecological space based on the mountain forest ecosystem. 展开更多
关键词 North-south Transitional Zone(NSTZ) protected area(PA) spatial-temporal pattern accessIBILITY the West-east corridor spatial overlap
在线阅读 下载PDF
A Robust Wi-Fi Fingerprinting Indoor Localization Coping with Access Point Movement
6
作者 Yuan Liang Xingqun Zhan +1 位作者 Wenhan Yuan Shuai Jing 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2017年第4期31-37,共7页
A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental e... A Wi-Fi fingerprinting localization approach has attracted increasing attention in recent years due to the ubiquity of Access Point( AP). However,typical fingerprinting localization methods fail to resist accidental environmental changes,such as AP movement. In order to address this problem,a robust fingerprinting indoor localization method is initiated. In the offline phase,three attributes of Received Signal Strength Indication( RSSI) —average,standard deviation and AP's response rate—are computed to prepare for the subsequent computation. In this way,the underlying location-relevant information can be captured comprehensively. Then in the online phase, a three-step voting scheme-based decision mechanism is demonstrated, detecting and eliminating the part of AP where the signals measured are severely distorted by AP 's movement. In the following localization step,in order to achieve accuracy and efficiency simultaneously,a novel fingerprinting localization algorithm is applied. Bhattacharyya distance is utilized to measure the RSSI distribution distance,thus realizing the optimization of MAximum Overlapping algorithm( MAO). Finally,experimental results are displayed,which demonstrate the effectiveness of our proposed methods in eliminating outliers and attaining relatively higher localization accuracy. 展开更多
关键词 wi-fi fingerprinting INDOOR localization RECEIVED Signal Strength INDICATION (RSSI) access Point MOVEMENT erroneous AP detecting algorithm
在线阅读 下载PDF
Creation of Virtual Wi-Fi Access Point and Secured Wi-Fi Pairing, through NFC
7
作者 Oussama Stiti Othmen Braham Guy Pujolle 《International Journal of Communications, Network and System Sciences》 2014年第6期175-180,共6页
The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the de... The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the development of a Wi-Fi strategy has become an imperative for almost all operators worldwide. In this context, APs (Access Points) have to become as secure as cellular networks. Furthermore, authentication process between a mobile device and an access point has to be automated, without user constraining configuration. For reaching this purpose, client must have different credentials depending on authentication method. Our goal is to create an architecture that is both ergonomic and flexible in order to meet the need for connection and client mobility. We use NFC technology as a radio channel for starting communication with the network. The communication initiation will instantiate a virtual Wi-Fi AP and distribute all policies and access certificates for an authentication based on EAP-TLS (it could be extended to any EAP method for 802.1X standard). The end result of our new topology is to allow access to services through a virtual Wi-Fi AP with an enterprise-grade in a public hotspot. 展开更多
关键词 wi-fi NFC VIRTUAL access Point PAIRING AUTOMATION
暂未订购
Java类protected继承链访问控制机制研究
8
作者 袁琼 《软件导刊》 2014年第11期51-52,共2页
基于从C++语言到Java语言类封装特性的演变,从类和类的继承两个方面讨论了Java打包类的4层访问控制特性,特别剖析、提出并用例程论证了Java类Protected继承链访问控制机制,研究结果为目前关于Java类封装机制的认识提供了补充。
关键词 JAVA 封装 访问控制
在线阅读 下载PDF
瑞安华数Wi-Fi降频接入网络MoCA Access1.1+改造升级方案
9
作者 陈朝智 曾步权 +1 位作者 唐啸谷 田玉江 《有线电视技术》 2017年第1期44-46,共3页
本文介绍了瑞安华数公司用Mo CA Access 1.1+(头端吞吐率800Mbps)升级原有Wi-Fi降频接入网络,为用户提供20Mbps^50Mbps带宽,解决原有网络的问题。
关键词 wi-fi降频 EOC MOCA access1.1+
在线阅读 下载PDF
基于区块链的数据安全共享研究
10
作者 郭毅 李旭青 +3 位作者 张子蛟 张宏涛 张连成 张香丽 《信息网络安全》 北大核心 2026年第1期1-23,共23页
数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共... 数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共享领域,能够显著提升共享过程的安全性与可信性。文章对基于区块链的数据安全共享相关研究工作进行综述。首先,构建了基于区块链的数据安全共享模型,并阐释了数据存储、访问控制、数据传输及隐私保护这3种关键技术的概念与定义;然后,针对数据存储、访问控制、数据传输及隐私保护、跨链技术的相关研究,从基本思想、优缺点及适用场景3个维度展开详细分析与对比;最后,探讨了当前基于区块链的数据安全共享面临的权限动态调整困难、数据隐私与透明性冲突等核心问题,并提出了若干可行的解决思路,同时对未来研究方向进行了展望。 展开更多
关键词 区块链 数据存储 访问控制 数据传输及隐私保护 跨链
在线阅读 下载PDF
Access数据库加密系统的安全性及其保护措施 被引量:2
11
作者 南亦民 张舞杰 《电脑知识与技术》 2007年第3期1206-1207,共2页
ACCESS数据库结构简。单、功能比较齐全、使用维护方便,因此,在功能能够满足要求的条件下,往往成为一些小型数据库软件的首选。但是由于数据库的加密机制非常简单,很容易破解数据库密码,安全性差。本文在分析了MSAccess数据库的加... ACCESS数据库结构简。单、功能比较齐全、使用维护方便,因此,在功能能够满足要求的条件下,往往成为一些小型数据库软件的首选。但是由于数据库的加密机制非常简单,很容易破解数据库密码,安全性差。本文在分析了MSAccess数据库的加密原理以及现有破解方法的基础上,给出了简便易行的保护措施。并且,用VB给出了切实可行的实现方案。应用表明,该保护措施能有效地提高数据库的安全性。 展开更多
关键词 access数据库 加密 破解 保护
在线阅读 下载PDF
一种分布式能源“四可”融合一体装置的研制与应用
12
作者 闫明月 王令君 +2 位作者 綦雪松 金圣权 王思源 《农村电气化》 2026年第1期73-76,共4页
随着“双碳”目标推进,分布式光伏与储能装置广泛接入低压配电网,使台区运行面临保护协调、协议兼容与能量调控等挑战。针对现有装置孤岛保护弱、协议不统一、多能源协同效率低等问题,文章研制了一种分布式能源“四可”融合一体装置。... 随着“双碳”目标推进,分布式光伏与储能装置广泛接入低压配电网,使台区运行面临保护协调、协议兼容与能量调控等挑战。针对现有装置孤岛保护弱、协议不统一、多能源协同效率低等问题,文章研制了一种分布式能源“四可”融合一体装置。该装置基于边缘计算和轻量化人工智能算法,实现了分布式光伏及储能系统的状态感知、协议自适配、柔性功率调节及智能孤岛保护等功能。显著提升了分布式能源系统的安全性、兼容性与调控水平,为低压台区分布式能源智能接入与优化运行提供了有效技术支撑。 展开更多
关键词 分布式能源 光伏并网 “四可”融合 边缘计算 智能孤岛保护
在线阅读 下载PDF
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption 被引量:8
13
作者 Tao Feng Hongmei Pei +2 位作者 Rong Ma Youliang Tian Xiaoqin Feng 《Computers, Materials & Continua》 SCIE EI 2021年第1期871-884,共14页
Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent char... Data privacy is important to the security of our society,and enabling authorized users to query this data efficiently is facing more challenge.Recently,blockchain has gained extensive attention with its prominent characteristics as public,distributed,decentration and chronological characteristics.However,the transaction information on the blockchain is open to all nodes,the transaction information update operation is even more transparent.And the leakage of transaction information will cause huge losses to the transaction party.In response to these problems,this paper combines hierarchical attribute encryption with linear secret sharing,and proposes a blockchain data privacy protection control scheme based on searchable attribute encryption,which solves the privacy exposure problem in traditional blockchain transactions.The user’s access control is implemented by the verification nodes,which avoids the security risks of submitting private keys and access structures to the blockchain network.Associating the private key component with the random identity of the user node in the blockchain can solve the collusion problem.In addition,authorized users can quickly search and supervise transaction information through searchable encryption.The improved algorithm ensures the security of keywords.Finally,based on the DBDH hypothesis,the security of the scheme is proved in the random prediction model. 展开更多
关键词 Blockchain privacy protection attribute encryption access control searchable-encryption
在线阅读 下载PDF
Novel Private Data Access Control Scheme Suitable for Mobile Edge Computing 被引量:2
14
作者 Wei Liang Songyou Xie +3 位作者 Jiahong Cai Chong Wang Yujie Hong Xiaoyan Kui 《China Communications》 SCIE CSCD 2021年第11期92-103,共12页
Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data e... Efficient response speed and information processing speed are among the characteristics of mobile edge computing(MEC).However,MEC easily causes information leakage and loss problems because it requires frequent data exchange.This work proposes an anonymous privacy data protection and access control scheme based on elliptic curve cryptography(ECC)and bilinear pairing to protect the communication security of the MEC.In the proposed scheme,the information sender encrypts private information through the ECC algorithm,and the information receiver uses its own key information and bilinear pairing to extract and verify the identity of the information sender.During each round of communication,the proposed scheme uses timestamps and random numbers to ensure the freshness of each round of conversation.Experimental results show that the proposed scheme has good security performance and can provide data privacy protection,integrity verification,and traceability for the communication process of MEC.The proposed scheme has a lower cost than other related schemes.The communication and computational cost of the proposed scheme are reduced by 31.08% and 22.31% on average compared with those of the other related schemes. 展开更多
关键词 mobile edge computing(MEC) privacy protection access control anonymous authentication
在线阅读 下载PDF
浅谈家庭Wi-Fi的组网方式及发展前景 被引量:1
15
作者 宋振亮 《信息通信》 2020年第6期281-282,共2页
随着通信及互联网技术的发展和日益完善,智慧家庭的概念开始广泛进入千家万户,居民通过与手机等智能终端的互动即可方便快捷的享受到舒适、高效的家居生活,而作为承载智慧家庭的家庭宽带网络,Wi-Fi(Wireless Fidelity)已成为大多数家庭... 随着通信及互联网技术的发展和日益完善,智慧家庭的概念开始广泛进入千家万户,居民通过与手机等智能终端的互动即可方便快捷的享受到舒适、高效的家居生活,而作为承载智慧家庭的家庭宽带网络,Wi-Fi(Wireless Fidelity)已成为大多数家庭必不可少的组成部分。文章主要介绍了现如今比较流行的几种家庭Wi-Fi组网方式,并对未来家庭WiFi的发展前景做出简要分析和研究。 展开更多
关键词 wi-fi(Wireless Fidelity) 路由器 AC(Wireless access Controller) AP(Wireless access Point) Mesh组网
在线阅读 下载PDF
Hardware/Compiler Memory Protection in Sensor Nodes
16
作者 Lanfranco LOPRIORE 《International Journal of Communications, Network and System Sciences》 2008年第3期235-240,共6页
With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the mic... With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardware complexity, available storage and energy consumption. Rather that precluding deliberately harmful programs from producing their effects, our solution is aimed at limiting the spread of programming errors outside the memory scope of the running program. The discussion evaluates the resulting protection environment from a number of salient viewpoints that include the implementation of common protection paradigms, efficiency in the distribution and revocation of access privileges, and the lack of a privileged (kernel) mode. 展开更多
关键词 access Control protectION DOMAIN protectION System Sensor NODE
暂未订购
Access Control Policy Based on Friend Circle
17
作者 Qin Liu Tinghuai Ma +3 位作者 Fan Xing Yuan Tian Abdullah Al-Dhelaan Mohammed Al-Dhelaan 《Computers, Materials & Continua》 SCIE EI 2020年第3期1143-1159,共17页
Nowadays,the scale of the user’s personal social network(personal network,a network of the user and their friends,where the user we call“center user”)is becoming larger and more complex.It is difficult to find a su... Nowadays,the scale of the user’s personal social network(personal network,a network of the user and their friends,where the user we call“center user”)is becoming larger and more complex.It is difficult to find a suitable way to manage them automatically.In order to solve this problem,we propose an access control model for social network to protect the privacy of the central users,which achieves the access control accurately and automatically.Based on the hybrid friend circle detection algorithm,we consider the aspects of direct judgment,indirect trust judgment and malicious users,a set of multi-angle control method which could be adapted to the social network environment is proposed.Finally,we propose the solution to the possible conflict of rights in the right control,and assign the rights reasonably in the case of guaranteeing the privacy of the users. 展开更多
关键词 Social network privacy protection circle of friends access control
在线阅读 下载PDF
Inverted XML Access Control Model Based on Ontology Semantic Dependency
18
作者 Meijuan Wang Jian Wang +1 位作者 Lihong Guo Lein Harn 《Computers, Materials & Continua》 SCIE EI 2018年第6期465-482,共18页
In the era of big data,the conflict between data mining and data privacy protection is increasing day by day.Traditional information security focuses on protecting the security of attribute values without semantic ass... In the era of big data,the conflict between data mining and data privacy protection is increasing day by day.Traditional information security focuses on protecting the security of attribute values without semantic association.The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information.Considering the semantic association,reasonable security access for privacy protect is required.Semi-structured and self-descriptive XML(eXtensible Markup Language)has become a common form of data organization for database management in big data environments.Based on the semantic integration nature of XML data,this paper proposes a data access control model for individual users.Through the semantic dependency between data and the integration process from bottom to top,the global visual range of inverted XML structure is realized.Experimental results show that the model effectively protects the privacy and has high access efficiency. 展开更多
关键词 Privacy protection access control semantic dependence inverted XML global view
在线阅读 下载PDF
Reference Encryption for Access Right Segregation and Domain Representation
19
作者 Lanfranco Lopriore 《Journal of Information Security》 2012年第2期86-90,共5页
With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solu... With reference to a protection model featuring processes, objects and domains, we consider the salient aspects of the protection problem, domain representation and access right segregation in memory. We propose a solution based on protected references, each consisting of the identifier of an object and the specification of a collection of access rights for this object. The protection system associates an encryption key with each object and each domain. A protected reference for a given object is always part of a domain, and is stored in memory in the ciphertext form that results from application of a double encryption using both the object key and the domain key. 展开更多
关键词 access RIGHT DOMAIN protection Symmetric-Key CRYPTOGRAPHY
暂未订购
Morphological Characterization of Mango (Mangifera indica) Accessions Based on Brazilian Adapted Descriptors
20
作者 Ierla Carla Nunes dos Santos Ribeirol Carlos Antonio Femandes Santos Francisco Pinheiro Lima Neto 《Journal of Agricultural Science and Technology(B)》 2013年第11期798-806,共9页
The aim of this study was to characterize 103 mango accessions of the field germplasm collection of Embrapa semi-arid region, located in Juazeiro, Bahia, Brazil and to apply 50 morphological descriptors established by... The aim of this study was to characterize 103 mango accessions of the field germplasm collection of Embrapa semi-arid region, located in Juazeiro, Bahia, Brazil and to apply 50 morphological descriptors established by the Brazilian Ministry of Agriculture, livestock and supply to help in the development of new mango cultivars for the Northeastern region of Brazil. Four trees were selected for each accession and eight adult leaves, eight flowers and 16 fruits were collected from each tree. Morphological characteristics ranging from plant size to seed embryo were evaluated. Simple percentages were estimated for all the descriptors. Only the descriptors for leaf symmetry and fruit waxiness did not show variability among the accessions. Eight accessions did not show fruits with fibers, while nine other accessions presented flesh firmness, which is an important characteristic to improve breeding. The soluble solids content was high, above 14 ~Brix for 95% of the accessions with Tommy Atkins showing the lowest value, 12.5 ~Brix. A great diversity was found in the color of the epidermis ranging from green to red. The accessions Amrapali and Salitre presented a dark orange flesh color. The obtained data set, are the most comprehensive so far in Brazil, it allows choosing the best parents to develop new cultivars and will also contribute to the protection of mango cultivars in Brazil. 展开更多
关键词 MANGO germplasm bank accessIONS morphological descriptors the international union for the protection of newvarieties of plants (UPOV).
在线阅读 下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部