English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46962/50828 (92%)
造訪人次 : 12410343      線上人數 : 1458
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/27778


    題名: 存取控制權限與交易可追蹤性之探討
    A Study of Access Control and Transaction Traceability
    作者: 莊佳蓉
    貢獻者: 資訊管理研究所碩士在職專班
    關鍵詞: 階層式存取控制
    Diffie-Hellman演算法
    單向鏈結環簽章
    Hierarchy Access Control
    Diffie-Hellman Algorithm
    Unidirectional Linking Ring Signature
    ULRS
    日期: 2006
    上傳時間: 2014-08-13 13:13:05 (UTC+8)
    摘要: 網際網路的快速發展,儲存於資訊系統中的資料,無疑是企業最重要的數位資產,然而因為人員管理制度不當,將對企業造成極大的困擾,尤其是目前利用個人帳號與通行碼來確認使用者身份,已不足以應付,如何針對此項問題,加強系統的安全防護,必定成為未來的重要課題之一。
    With the Internet rapid developing, one of the most challenging problems in man-aging large networked systems is the complexity of security administration. Most or-ganizations think that security is paramount to database administrators seeking to pro-tect their gigabytes of vital business data from the prying eyes of unauthorized outsiders and insiders attempting to exceed their authority. All relational database management systems provide some sort of intrinsic security mechanisms designed to minimize these threats.
      For the general hierarchy access control problem, Akl and Taylor suggested a well known scheme for the cryptographic key assignment. In this study, we will analyze the advantage and disadvantage of Akl and Taylor's scheme and propose a new scheme of key exchange based on Diffie-Hellman (DH)algorithm. In practical use today, DH algorithm is enabling technology and effectiveness for nearly every encryption in use in the Internet today.
      In addition, the aim of this study presents a new digital signature verification model to make the transmission more secure during the process of key exchange. It applies the singly linked to allow a sequence of dynamically allocated storage elements in Log DB. It will use Hash Function algorithm to achieve the integrity and authentication of dynamic data since hash functions are generally faster than digital signature algorithms.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    沒有與此文件相關的檔案.



    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋