文化大學機構典藏 CCUR:Item 987654321/27778
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 46962/50828 (92%)
Visitors : 12424936      Online Users : 1229
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/27778


    Title: 存取控制權限與交易可追蹤性之探討
    A Study of Access Control and Transaction Traceability
    Authors: 莊佳蓉
    Contributors: 資訊管理研究所碩士在職專班
    Keywords: 階層式存取控制
    Diffie-Hellman演算法
    單向鏈結環簽章
    Hierarchy Access Control
    Diffie-Hellman Algorithm
    Unidirectional Linking Ring Signature
    ULRS
    Date: 2006
    Issue Date: 2014-08-13 13:13:05 (UTC+8)
    Abstract: 網際網路的快速發展,儲存於資訊系統中的資料,無疑是企業最重要的數位資產,然而因為人員管理制度不當,將對企業造成極大的困擾,尤其是目前利用個人帳號與通行碼來確認使用者身份,已不足以應付,如何針對此項問題,加強系統的安全防護,必定成為未來的重要課題之一。
    With the Internet rapid developing, one of the most challenging problems in man-aging large networked systems is the complexity of security administration. Most or-ganizations think that security is paramount to database administrators seeking to pro-tect their gigabytes of vital business data from the prying eyes of unauthorized outsiders and insiders attempting to exceed their authority. All relational database management systems provide some sort of intrinsic security mechanisms designed to minimize these threats.
      For the general hierarchy access control problem, Akl and Taylor suggested a well known scheme for the cryptographic key assignment. In this study, we will analyze the advantage and disadvantage of Akl and Taylor's scheme and propose a new scheme of key exchange based on Diffie-Hellman (DH)algorithm. In practical use today, DH algorithm is enabling technology and effectiveness for nearly every encryption in use in the Internet today.
      In addition, the aim of this study presents a new digital signature verification model to make the transmission more secure during the process of key exchange. It applies the singly linked to allow a sequence of dynamically allocated storage elements in Log DB. It will use Hash Function algorithm to achieve the integrity and authentication of dynamic data since hash functions are generally faster than digital signature algorithms.
    Appears in Collections:[Department of Information Management & Graduate Institute of Information Management] Thesis

    Files in This Item:

    There are no files associated with this item.



    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback