期刊文献+
共找到3,343篇文章
< 1 2 168 >
每页显示 20 50 100
基于Data Access规范的OPC Server的研究与实现 被引量:2
1
作者 周强 杨明极 +1 位作者 沈辉 郭剑虹 《哈尔滨理工大学学报》 CAS 2007年第2期107-109,113,共4页
为了实现OPC数据存取服务器,依据OPC数据存取2.05a技术规范,采用了ATL技术,建立了OPC数据存取服务器的结构模型,实现了OPC数据存取服务器的构建及OPC数据存取服务器的主要功能.
关键词 OPC 数据存取 ATL
在线阅读 下载PDF
Construction of a reusable data access layer based on .NET
2
作者 王远斌 《Journal of Chongqing University》 CAS 2005年第2期76-79,共4页
A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution util... A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively. 展开更多
关键词 N-tier architecture data access layer reflection technology REUSE
在线阅读 下载PDF
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN 被引量:1
3
作者 Xiaoyan Hu Xuhui Liu +2 位作者 Lixia Zhao Jian Gong Guang Cheng 《China Communications》 SCIE CSCD 2019年第7期120-130,共11页
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an upstream node due to its multipath forwarding. Furthermore, we propose NDRUDAF, a NACK based mechanism that enhances the Interest forwarding and enables Detection and fast Recovery from such Unanticipated Data Access Failure. In the NDN enhanced with NDRUDAF, the router that aggregates the Interest detects such unanticipated data access failure based on a negative acknowledgement from the upstream node that judges the Interest as a duplicate one. Then the router retransmits the Interest as soon as possible on behalf of the requester whose Interest is aggregated to fast recover from the data access failure. We qualitatively and quantitatively analyze the performance of the NDN enhanced with our proposed NDRUDAF and compare it with that of the present NDN. Our experimental results validate that NDRUDAF improves the system performance in case of such unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers. 展开更多
关键词 named data networking INTEREST aggregation multipath FORWARDING data access FAILURE negative ACKNOWLEDGEMENT
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
4
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD data STORAGE CLOUD Service PROVIDER Formula-Based CLOUD data access Control Multi-Agent System and Secure Java Agent Development Framework
在线阅读 下载PDF
Data Virtualization with SAP HANA Smart Data Access
5
作者 Abani Pattanayak 《Journal of Computer and Communications》 2017年第8期62-68,共7页
Digital transformation has been corner stone of business innovation in the last decade, and these innovations have dramatically changed the definition and boundaries of enterprise business applications. Introduction o... Digital transformation has been corner stone of business innovation in the last decade, and these innovations have dramatically changed the definition and boundaries of enterprise business applications. Introduction of new products/ services, version management of existing products/ services, management of customer/partner connections, management of multi-channel service delivery (web, social media, web etc.), merger/acquisitions of new businesses and adoption of new innovations/technologies will drive data growth in business applications. These datasets exist in different sharing nothing business applications at different locations and in various forms. So, to make sense of this information and derive insight, it is essential to break the data silos, streamline data retrieval and simplify information access across the entire organization. The information access framework must support just-in-time processing capabilities to bring data from multiple sources, be fast and powerful enough to transform and process huge amounts of data quickly, and be agile enough to accommodate new data sources per user needs. This paper discusses the SAP HANA Smart Data Access data-virtualization technology to enable unified access to heterogenous data across the organization and analysis of huge volume of data in real-time using SAP HANA in-memory platform. 展开更多
关键词 SAP HANA In-Memory Computing SMART data access (SDA) data VIRTUALIZATION & data FEDERATION Virtual data Model And Big data
暂未订购
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
6
作者 Zhixin Li Lei Liu Kin Wang 《国际计算机前沿大会会议论文集》 2018年第1期33-33,共1页
在线阅读 下载PDF
基于Access的电子健康记录管理数据库设计
7
作者 欧雪山 《计算机应用文摘》 2026年第3期143-145,共3页
随着信息技术的飞速发展,电子健康记录系统已成为现代医疗体系的重要基础设施,其核心功能是实现患者健康信息的系统化、高效化管理。文章以Microsoft Access数据库为基础,设计并实现了一套电子健康记录管理数据库系统。借助Access平台... 随着信息技术的飞速发展,电子健康记录系统已成为现代医疗体系的重要基础设施,其核心功能是实现患者健康信息的系统化、高效化管理。文章以Microsoft Access数据库为基础,设计并实现了一套电子健康记录管理数据库系统。借助Access平台在数据建模、界面开发与查询统计方面的灵活性优势,构建了覆盖患者基本信息、病历记录、检查结果及用药信息等核心模块的集成化管理平台。系统通过规范化的表结构设计、关系建立及窗体查询功能,支持多维度数据检索与统计分析,有效提升了患者信息管理工作的准确性和效率。实际应用表明,该系统能够显著减少人工录入错误与重复操作,为临床决策及机构管理提供及时、可靠的数据支持。 展开更多
关键词 电子健康记录 Microsoft access 数据库设计 医疗信息管理 数据查询与统计
在线阅读 下载PDF
KnowID:An Architecture for Efficient Knowledge-Driven Information and Data Access
8
作者 Pablo Rubén Fillottrani C.Maria Keet 《Data Intelligence》 2020年第4期487-512,共26页
Modern information systems require the orchestration of ontologies,conceptual data modeling techniques,and efficient data management so as to provide a means for better informed decision-making and to keep up with new... Modern information systems require the orchestration of ontologies,conceptual data modeling techniques,and efficient data management so as to provide a means for better informed decision-making and to keep up with new requirements in organizational needs.A major question in delivering such systems,is which components to design and put together to make up the required“knowledge to data”pipeline,as each component and process has trade-offs.In this paper,we introduce a new knowledge-to-data architecture,KnowID.It pulls together both recently proposed components and we add novel transformation rules between Enhanced Entity-Relationship(EER)and the Abstract Relational Model to complete the pipeline.KnowID’s main distinctive architectural features,compared to other ontology-based data access approaches,are that runtime use can avail of the closed world assumption commonly used in information systems and of full SQL augmented with path queries. 展开更多
关键词 Extended entity-relationship diagrams Abstract relational model Ontology-based data access
原文传递
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
9
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法及其比较 被引量:1
10
作者 吴东宁 何丽云 +3 位作者 王鑫 艾艳柯 文天才 吕晓颖 《中国卫生产业》 2016年第19期18-20,共3页
目的介绍应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法并进行比较,以探讨其可行性、实用性。方法以胸痹心痛临床研究的病例报告表(CRF)为例,分别介绍应用Access,Epi Data软件建设数据库的步骤和流程,并进行比较。结果应用A... 目的介绍应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法并进行比较,以探讨其可行性、实用性。方法以胸痹心痛临床研究的病例报告表(CRF)为例,分别介绍应用Access,Epi Data软件建设数据库的步骤和流程,并进行比较。结果应用Access,Epi Data软件建设胸痹心痛临床研究数据库的共同特点为:占用空间较小,界面友好,直观性强,简单易学,操作方便,可以较好的服务于数据管理;区别主要在于费用、存储空间、自动保存、网络功能、管理权限和导出格式等方面。结论应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法简单、实用,对于我国现阶段一般的中医药临床研究比较适用,也很适合临床单位中以科室或医生个人为主体开展的研究使用,且对于数据管理的普及、规范和进步有重要意义。 展开更多
关键词 access EPI data 胸痹心痛 数据库
暂未订购
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:2
11
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
在线阅读 下载PDF
Database-oriented storage based on LMDB and linear octree for massive block model 被引量:6
12
作者 毕林 赵辉 贾明涛 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2016年第9期2462-2468,共7页
Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, incl... Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be. 展开更多
关键词 block model linear octree lightning memory-mapped database mass data access digital mine etree
在线阅读 下载PDF
Thermal stability and data retention of resistive random access memory with HfOx/ZnO double layers
13
作者 赖云锋 陈凡 +3 位作者 曾泽村 林培杰 程树英 俞金玲 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第8期411-416,共6页
As an industry accepted storage scheme, hafnium oxide(HfO_x) based resistive random access memory(RRAM)should further improve its thermal stability and data retention for practical applications. We therefore fabri... As an industry accepted storage scheme, hafnium oxide(HfO_x) based resistive random access memory(RRAM)should further improve its thermal stability and data retention for practical applications. We therefore fabricated RRAMs with HfO_x/ZnO double-layer as the storage medium to study their thermal stability as well as data retention. The HfO_x/ZnO double-layer is capable of reversible bipolar switching under ultralow switching current(〈 3 μA) with a Schottky emission dominant conduction for the high resistance state and a Poole–Frenkel emission governed conduction for the low resistance state. Compared with a drastically increased switching current at 120℃ for the single HfO_x layer RRAM, the HfO_x/ZnO double-layer exhibits excellent thermal stability and maintains neglectful fluctuations in switching current at high temperatures(up to 180℃), which might be attributed to the increased Schottky barrier height to suppress current at high temperatures. Additionally, the HfO_x/ZnO double-layer exhibits 10-year data retention @85℃ that is helpful for the practical applications in RRAMs. 展开更多
关键词 resistive random access memory (RRAM) thermal stability data retention double layer
原文传递
Study on Mandatory Access Control in a Secure Database Management System
14
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance integrity cluster
在线阅读 下载PDF
Reevaluating Data Stall Time with the Consideration of Data Access Concurrency
15
作者 刘宇航 孙贤和 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第2期227-245,共19页
Data access delay has become the prominent performance bottleneck of high-end computing systems. The key to reducing data access delay in system design is to diminish data stall time. Memory locality and concurrency a... Data access delay has become the prominent performance bottleneck of high-end computing systems. The key to reducing data access delay in system design is to diminish data stall time. Memory locality and concurrency are the two essential factors influencing the performance of modern memory systems. However, existing studies in reducing data stall time rarely focus on utilizing data access concurrency because the impact of memory concurrency on overall memory system performance is not well understood. In this study, a pair of novel data stall time models, the L-C model for the combined effort of locality and concurrency and the P-M model for the effect of pure miss on data stall time, are presented. The models provide a new understanding of data access delay and provide new directions for performance optimization. Based on these new models, a summary table of advanced cache optimizations is presented. It has 38 entries contributed by data concurrency while only has 21 entries contributed by data locality, which shows the value of data concurrency. The L-C and P-M models and their associated results and opportunities introduced in this study are important and necessary for future data-centric architecture and algorithm design of modern computing systems. 展开更多
关键词 memory wall data stall time memory concurrency concurrent average memory access time (C-AMAT)
原文传递
共同富裕背景下数据要素共享与城乡融合发展——基于政府数据开放平台的准自然实验
16
作者 杨肃昌 张世斌 《农村经济》 北大核心 2026年第1期118-127,共10页
共同富裕背景下,数据要素共享是激活与释放数据要素价值、推动城乡居民共享数字红利的关键举措,是推动城乡融合发展的重要力量。以中国城市上线政府数据开放平台为准自然实验,运用多期双重差分模型展开实证分析,检验数据要素共享对城乡... 共同富裕背景下,数据要素共享是激活与释放数据要素价值、推动城乡居民共享数字红利的关键举措,是推动城乡融合发展的重要力量。以中国城市上线政府数据开放平台为准自然实验,运用多期双重差分模型展开实证分析,检验数据要素共享对城乡融合发展的影响。研究发现,数据要素共享对城乡融合发展具有显著促进作用,该基本结论经过一系列内生性处理和稳健性检验后仍然成立。机制分析表明,数据要素共享通过城乡信息壁垒、城乡要素流动与配置、城乡制度性交易成本、城乡绿色转型等渠道影响城乡融合发展。异质性分析表明,数据要素共享对城乡融合发展的促进效应在区域上呈“东部—中部—西部”依次递增之势,对要素禀赋存在优势和行政级别更高的城市,促进效应更大。基于此,各地方政府应全面推动政府数据的开放共享,促进城乡融合进程加快推进。 展开更多
关键词 数据要素 数字经济 政府数据开放 城乡融合发展
原文传递
基于Access的灌溉信息管理系统 被引量:8
17
作者 宋妮 王景雷 孙景生 《节水灌溉》 北大核心 2007年第2期37-39,共3页
针对目前灌溉试验资料的管理、整编、归档、查询仍靠试验人员手工完成的落后局面,为有效地管理和查询灌溉试验数据,在windows 2000或windows XP操作系统下,使用Access开发了灌溉信息管理查询系统。该系统具有对灌溉试验数据进行输入、... 针对目前灌溉试验资料的管理、整编、归档、查询仍靠试验人员手工完成的落后局面,为有效地管理和查询灌溉试验数据,在windows 2000或windows XP操作系统下,使用Access开发了灌溉信息管理查询系统。该系统具有对灌溉试验数据进行输入、查询、修改、删除等功能,系统不仅功能全面,且可靠性高,稳定性好,界面可视性强,易于操作。 展开更多
关键词 灌溉试验 资料查询 数据库 access
在线阅读 下载PDF
基于区块链的数据安全共享研究
18
作者 郭毅 李旭青 +3 位作者 张子蛟 张宏涛 张连成 张香丽 《信息网络安全》 北大核心 2026年第1期1-23,共23页
数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共... 数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共享领域,能够显著提升共享过程的安全性与可信性。文章对基于区块链的数据安全共享相关研究工作进行综述。首先,构建了基于区块链的数据安全共享模型,并阐释了数据存储、访问控制、数据传输及隐私保护这3种关键技术的概念与定义;然后,针对数据存储、访问控制、数据传输及隐私保护、跨链技术的相关研究,从基本思想、优缺点及适用场景3个维度展开详细分析与对比;最后,探讨了当前基于区块链的数据安全共享面临的权限动态调整困难、数据隐私与透明性冲突等核心问题,并提出了若干可行的解决思路,同时对未来研究方向进行了展望。 展开更多
关键词 区块链 数据存储 访问控制 数据传输及隐私保护 跨链
在线阅读 下载PDF
基于全球研究数据注册仓储Re3data.org的医学科学数据仓储建设 被引量:9
19
作者 吴思竹 李赞梅 +2 位作者 崔佳伟 修晓蕾 钱庆 《中华医学图书情报杂志》 CAS 2018年第9期20-31,共12页
目的:总结全球医学领域科学数据仓储建设现状、经验与不足,为我国医学科学数据仓储建设提供参考和借鉴。方法:利用统计分析、共现分析和社会网络分析等方法,结合可视化图表对2018年Re3data.org中收录的637个医学科学数据仓储的分布、建... 目的:总结全球医学领域科学数据仓储建设现状、经验与不足,为我国医学科学数据仓储建设提供参考和借鉴。方法:利用统计分析、共现分析和社会网络分析等方法,结合可视化图表对2018年Re3data.org中收录的637个医学科学数据仓储的分布、建设等情况进行分析。结果:美国、英国和国际组织在仓储合作建设中贡献最为突出,其中美国参与建设的数据仓储占50%,独立建设仓储达241个。多数仓储收录3~6类数据,科学和统计数据是被收录最多的类型,收录数据主题丰富,64.36%的仓储提供数据质控。Dspace等7种软件被用于数据仓储建设,数据管理涉及5种唯一标识符、16种元数据。结论:欧美国家占据了数据仓储建设高地,需多方合作共促数据开放共享。开源技术降低了仓储搭建门槛,标准规范建设保障仓储运管,数据分级共享提供接口支持,政策许可可保障多方权益。 展开更多
关键词 医学数据 数据仓储 开放数据 数据共享
在线阅读 下载PDF
基于动态数据敏感等级的大数据细粒度访问控制模型
20
作者 张焕 侯明星 +1 位作者 刘光娜 史颖 《计算机科学》 北大核心 2026年第2期187-195,共9页
针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据... 针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据的实时敏感等级,克服了传统静态分类的僵化性。在此基础上,将动态敏感等级作为核心决策属性,与基于属性的访问控制模型深度集成,设计了一种情境自适应的权限动态授予与撤销机制,实现了对不同用户在不同时间、地点及场景下访问行为的精准管控。实验结果表明,该模型能够在保证较低性能开销的同时,有效感知数据价值与风险的变化,相较于传统基于角色的访问控制模型和静态基于属性的访问控制模型,在权限分配的精确度与安全性上均有显著提升,尤其适用于数据流动频繁、安全需求多变的大数据应用场景,为构建智能、自适应的数据安全防护体系提供了有效途径。 展开更多
关键词 大数据安全 访问控制 细粒度 动态敏感等级 属性基访问控制
在线阅读 下载PDF
上一页 1 2 168 下一页 到第
使用帮助 返回顶部