信息产业部数据信科学技术研究所,北京,100083
Published:2000
移动端阅览
[1]张智恒,李通.使用代理技术实现基于角色的访问控制和数据加密[J].电信工程技术与标准化,2000(03):14-16.
张智恒, 李通. Use Proxy Technoly to Impliment Role Based Accesee Control and Encryption[J]. 2000, (3): 14-16.
[1]张智恒,李通.使用代理技术实现基于角色的访问控制和数据加密[J].电信工程技术与标准化,2000(03):14-16. DOI: 10.13992/j.cnki.tetas.2000.03.005.
张智恒, 李通. Use Proxy Technoly to Impliment Role Based Accesee Control and Encryption[J]. 2000, (3): 14-16. DOI: 10.13992/j.cnki.tetas.2000.03.005.
本文论述以代理技术实现基于角色的访问控制和加密技 术,以处理信息应用系统建设及其安全加密系统建设的工 程关系。
Proxy technoly was applied to implement RBAC(Role Based Accesee Control)and encryption. By this technology both of information application system and its security architecture could cooperate well.
0
Views
35
下载量
3
CSCD
Publicity Resources
Related Articles
Related Author
Related Institution