Access

Discover access, include the articles, news, trends, analysis and practical advice about access on alibabacloud.com

Research and implementation of access control subsystem based on attribute encryption in cloud storage

Research and realization of access control subsystem based on attribute encryption in cloud storage Sun Youpeng because of the complexity of the cloud environment, the various entities are not trusted, so password access control technology to prevent user data leakage is the most direct means. In recent years, the academia has introduced the attribute-based encryption system in the access control, which is a method developed on the basis of identity encryption. This paper chooses the access control technology in cloud storage as the research direction, and deeply analyzes some problems of access control technology based on attribute encryption. Including the lack of access policy expression, permission to withdraw ...

A Secure Data Access mechanism for Cloud tenants

A secure data access mechanism for Cloud tenants Chunming Rong hongbing Cheng at this monitors, we a a secure data access mecha Nism based on identity-based encryption and biometric ...

Using cloud computing technology to construct open access platform of regional agricultural science and technology

Application of cloud computing technology in building regional agricultural science and technology open access platform Li Xiaojing based on the analysis of the current research situation and development trend of agricultural OA platform at home and abroad, this paper integrates the technology OA resources of Qingdao area, puts forward the conception of the highly interactive OA platform of agricultural technology based on cloud computing technology, and expounds in detail the service layer of infrastructure, The architecture of Platform service layer, application service layer and cloud client. The construction of the platform can not only integrate the information of the Qingdao Agricultural Research Institute, but also provide information service for the scientific research institutes and Qingdao grass-roots technology extension personnel and farmers.

Hdfsblock loss of excessive access to Safe Mode (SafeMode) solution

HDFS block lost too much access to Safe Mode solution background and description of the phenomenon (Background and symptom) due to insufficient disk space, low memory, system power loss and other reasons caused Datanode DataBlock lost, Similar logs appear as follows: The number of live Datanodes 3 super-delegates reached the minimum number 0. Safe mod ...

PHP statistics static HTML page browse access number code

PHP tutorials Statistics static HTML page Browse access number code//count.php $aid = isset ($_get[' aid ')? $_get[' aid ']: '; $t = isset ($_get[' t '])? $_get[' t ']: '; if (Intval ($aid)) {if ($t = = ' show ') {echo &q ...

Phpvirtualbox 4.1-3 publish access and control remote VirtualBox instances

Phpvirtualbox 4.1-3 This version increases the compatibility of the VirtualBox 4.1.x version. It has all sorts of wrong fixes. New features include cloning virtual machines, displaying host memory usage, and improving guest addistions installation processing and support for parallels hard disk image formats. Phpvirtualbox is an open source Ajax implementation of the VirtualBox user interface. It allows you to access and control remote VirtualBox instances. Download Address ...

Authorization access control of privacy protection in public cloud

Privacy preserving delegated Access control in public clouds Mohamed Nabeel, Elisa Bertino We utilize a efficient group key Management scheme that supports expressive ACPs. Our system assures th ...

Research and application of mobile Terminal Cloud resource access mode based on Hadoop architecture

Research and application of mobile Terminal Cloud resource access model based on Hadoop Architecture Beijing University of Technology Tangyan in order to build a mobile terminal cloud resource access model on the Hadoop architecture, the basic components of the Hadoop architecture are first understood, And emphatically analyzes its core component HDFs Distributed File System and MapReduce distributed programming model working principle. The consistency of Hadoop and cloud computing in view and key technologies makes Hadoop a distributed cloud computing platform. Second, the cloud resource access mode is divided ...

More than one side of the Internet: Access defines the web future

Abstract: This is Lucy Ingham's article, he looked from the development of the form of access to the evolution of the Internet, that in order to adapt to different forms of access, in the future there may be many other forms of access difficult to understand the Internet. For example, some websites you put on this is Lucy Ingham's article, he looked from the development of the form of access to the evolution of the Internet, that in order to adapt to different forms of access, in the future there may be many other forms of access difficult to understand the Internet. For example, some websites you wear Oculus Rift ability ...

Practical Novice SEO Access list mode

Absrtact: For novice seo, if it is their own independent Sohu, how to receive SEO is a more important knowledge. Here is a good summary of some of the practical rookie SEO access to help the novice SEO has a job to do. 1. Local SEO keyword optimization method for novice SEO, if it is their own independent Sohu, how to receive SEO is a more important knowledge. Here is a good summary of some of the practical rookie SEO access to help the novice SEO has a job to do. 1. Local SEO keyword optimization method to do ...

PHP Access database instance tutorial

When the client site is ASP + ACCESS platform how to transplant to the PHP platform? First of all, we want to solve the PHP Access database connection problem, without changing the database, PHP how to establish a connection with the Access database? PHP provides a variety of connection database solutions, explain in detail how to use PHP ADOdb, PDO, ODBC and Access database connection instance code. Preparation First, the use of PHP ADOdb Access database 1, first of all you need to ...

Access to QQ relationship chain surge in active week

Recently, the ultra-popular casual game "happy consumer music," a fast-moving news, since May 15 in the application platform version of the treasure access to the QQ relationship chain, the game weekly per capita activity increased substantially 60%, the number of players and friends Friends have extremely significant interaction between the upgrade, friends squeeze into the rankings at all overnight record refresh competition, QQ relationship chain brought the high activity and super sticky developers surprise, the application of social and social open ability Another new benchmark. Access to the QQ relationship chain increased 60% active weeks of the week the number of friends and interaction significantly improve the "happy consumer music" is a strategic leisure ...

Jmx4perl 1.03 publish the Access tool for the Java JEE Server Management interface

Jmx4perl is a tool that provides another way to access the Java Jee Server management interface, based on JMX. It is an agent-based approach, with small Web applications deployed on the http://www.aliyun.com/zixun/aggregation/15818.html > Application Server, providing a http/based JSON Access application server has registered JMX Mbeans. Built from a small number of Perl modules, it can be used in ...

Distributed access control system 1.4.27 Publishing access controls

Distributed access control system abbreviation DACS is a lightweight single sign-on http://www.aliyun.com/zixun/aggregation/38609.html "> Access controller. It provides flexible, modular authentication methods, powerful, transparent rules based Web service authorization checks, CGI programs, or almost any program. Distributed Access Control ...

Libquicktime 1.2.4 Publishing QuickTime file Access tool

Libquicktime is an enhanced Quicktime4linux library for reading and writing Quicktime/avi/mp4 file libraries and provides multiple supported codecs for easy access to QuickTime files. All Third-party libraries are removed from Sourcetree and the entire system-installed library can be detected through configuration scripts. All original codecs have been transferred to dynamically loaded modules and new codecs are being developed. Proprietary API extensions allow access to the codec registry and more easily handle audio and visual ...

Quexs 1.5.0 Publishing Computer-assisted telephone access system

Quexs is a web-based computer-assisted telephone access CATI system. Create an online questionnaire to collect data and asterisk VoIP calls through the integration of Quexs and Quexml. Quexs can be used to operate the outbound telephone research center. Quexs 1.5.0 version of LimeSurvey installation has been updated to version 1.91+. Quexs Questionnaires and sample filtration responses have been added to all data output and browsing LimeSurvey instrumentation stages. Software Information: Http://qu ...

Hebei Mobile Speed WLAN construction wireless internet access

In recent years, with Samsung, Apple, Lenovo and other as the representative of the emergence of intelligent terminals, consumer demand for mobile internet business is growing, 2/3G network has been unable to meet the current demand for a large number of data service applications, WLAN wireless broadband coverage has become the key to the construction of major operators. According to Hebei Mobile data business leader, WLAN business is a wireless broadband access services provided by China Mobile, in the presence of China Mobile WLAN signal CMCC or cmcc-edu coverage area, users can have WLAN function of the notebook computer, mobile phone and other terminals to access each other ...

Research on data access control method in cloud computing

Research on data access control method in cloud computing Nanjing University of Posts and telecommunications This paper proposes an attribute-based access control model (DACC) for cloud computing environment using CP-ABE encryption algorithm. The core idea is to use the AES symmetric encryption algorithm and the Cp-abe encryption algorithm, respectively to encrypt the data and symmetric key, and the user of the attribute matching to decrypt the key cipher text and the data cipher in sequence. In order to reduce the cost of storing and updating keys, the Key Distribution center KDC is introduced to manage attributes and keys. Cloud computing Service Provider ...

Research and application of access control mechanism in cloud computing environment

Research and application of access control mechanism in cloud computing environment University Li Shigang based on the research of traditional access control technology, this paper analyzes the application requirements of access control technology in cloud computing environment. Aiming at the problem of virtual machine security and privilege management in cloud computing environment, a security solution based on access control technology is proposed and implemented. The main work is as follows: 1. This paper studies the application status of the traditional access control technology, analyzes the application status of the access control technology in cloud environment, analyzes its characteristics and analyzes the new requirements under the cloud computing environment. 2. For virtual machine security isolation, ...

Wireless WIFI suddenly can not access how to solve how to delete the configuration file

Recently when using this notebook to connect WIFI some strange problems, the first connection is successful, but not on the network, and later found that the connection is not on, what is going on? WIFI wireless Internet access suddenly how to do? WIN7 whether This problem can be solved by deleting the wireless network configuration. It shows that the connection is successful, but the status is unidentified, there is no Internet access, WIFI password, it is presumed that after the connection is successful, the wireless router changes the WIFI password. Okay, suddenly there is no way to connect to the ...

Total Pages: 180 1 .... 5 6 7 8 9 .... 180 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.