文化大學機構典藏 CCUR:Item 987654321/27778
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46962/50828 (92%)
造访人次 : 12425082      在线人数 : 761
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/27778


    题名: 存取控制權限與交易可追蹤性之探討
    A Study of Access Control and Transaction Traceability
    作者: 莊佳蓉
    贡献者: 資訊管理研究所碩士在職專班
    关键词: 階層式存取控制
    Diffie-Hellman演算法
    單向鏈結環簽章
    Hierarchy Access Control
    Diffie-Hellman Algorithm
    Unidirectional Linking Ring Signature
    ULRS
    日期: 2006
    上传时间: 2014-08-13 13:13:05 (UTC+8)
    摘要: 網際網路的快速發展,儲存於資訊系統中的資料,無疑是企業最重要的數位資產,然而因為人員管理制度不當,將對企業造成極大的困擾,尤其是目前利用個人帳號與通行碼來確認使用者身份,已不足以應付,如何針對此項問題,加強系統的安全防護,必定成為未來的重要課題之一。
    With the Internet rapid developing, one of the most challenging problems in man-aging large networked systems is the complexity of security administration. Most or-ganizations think that security is paramount to database administrators seeking to pro-tect their gigabytes of vital business data from the prying eyes of unauthorized outsiders and insiders attempting to exceed their authority. All relational database management systems provide some sort of intrinsic security mechanisms designed to minimize these threats.
      For the general hierarchy access control problem, Akl and Taylor suggested a well known scheme for the cryptographic key assignment. In this study, we will analyze the advantage and disadvantage of Akl and Taylor's scheme and propose a new scheme of key exchange based on Diffie-Hellman (DH)algorithm. In practical use today, DH algorithm is enabling technology and effectiveness for nearly every encryption in use in the Internet today.
      In addition, the aim of this study presents a new digital signature verification model to make the transmission more secure during the process of key exchange. It applies the singly linked to allow a sequence of dynamically allocated storage elements in Log DB. It will use Hash Function algorithm to achieve the integrity and authentication of dynamic data since hash functions are generally faster than digital signature algorithms.
    显示于类别:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的档案:

    没有与此文件相关的档案.



    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈