Ms Access Cloud Based

Learn about ms access cloud based, we have the largest and most updated ms access cloud based information on alibabacloud.com

Application access security control based on cloud data

One of the cloud computing infrastructures is to provide a reliable and secure data storage center, so storage security is one of the security topics in the Cloud computing field. Storage security in cloud storage applications includes data encryption storage, security policy management, security logging, and auditing. Security logs and audits provide the necessary audit information for both the monitoring system and the active user.   Especially the security control of data access is especially important, and the access control mechanism of data is a subject to be studied in the tradeoff of providing security and convenience for users to share. Amazon S3 S3, EMC Atmos on ...

Research on access control of management information system based on cloud computing

Research on access control of management information system based on cloud computing Chongqing in this paper, the existing workflow technology and access control model are fully studied, based on the TRBAC model of the most suitable workflow management system, some improvements are made to the model from the angle of application. This model introduces the role concept of role-based access control into task-based access control, the core idea of which is to enable the user to access the data by acquiring a role (but the authorization step that contains the permission must be activated, otherwise the role's permissions will be frozen). ...

Research and implementation of cloud storage access control technology based on ontology

Research and implementation of cloud storage access control technology based on ontology Ecust Hong based on the characteristics of cloud storage access control and cloud storage standard (CDMI), this paper improves the access control domain, storage object and role inheritance of RBAC model, and increases the time constraint on roles and permissions. At the same time, using ontology technology and owl language, the ontology of access control model is established, and the semantic technology describes the entity and strategy of DONTO_RBAC, which realizes the security strategy of access control in the multi domain environment through ontology, which is based on the ...

Research and implementation of access control subsystem based on attribute encryption in cloud storage

Research and realization of access control subsystem based on attribute encryption in cloud storage Sun Youpeng because of the complexity of the cloud environment, the various entities are not trusted, so password access control technology to prevent user data leakage is the most direct means. In recent years, the academia has introduced the attribute-based encryption system in the access control, which is a method developed on the basis of identity encryption. This paper chooses the access control technology in cloud storage as the research direction, and deeply analyzes some problems of access control technology based on attribute encryption. Including the lack of access policy expression, permission to withdraw ...

Research and application of mobile Terminal Cloud resource access mode based on Hadoop architecture

Research and application of mobile Terminal Cloud resource access model based on Hadoop Architecture Beijing University of Technology Tangyan in order to build a mobile terminal cloud resource access model on the Hadoop architecture, the basic components of the Hadoop architecture are first understood, And emphatically analyzes its core component HDFs Distributed File System and MapReduce distributed programming model working principle. The consistency of Hadoop and cloud computing in view and key technologies makes Hadoop a distributed cloud computing platform. Second, the cloud resource access mode is divided ...

A secure cloud access method based on SDN

A secure cloud access method based on SDN Xu Yao Guo Zhigang Shouguo This paper combines SDN (Software tabbed Networking) technology to propose a new security cloud access model from the point of Access security. In this model, the cloud service provider (CSP) is concerned only with data processing and storage, and the third server provides the corresponding access security service according to the needs of the cloud users. In a SDN network, a third service can adopt a network management policy based on service name addressing, which makes the service easy to extend or recover. ...

Research on data access control strategy of meteorological cloud based on attribute encryption

Study on data access control strategy of meteorological cloud based on attribute encryption Fangzhong Xiazhihua Zhou Shu with the increasing of meteorological service level, the problem of cloud storage and instant sharing of meteorological data is becoming more and more prominent. Aiming at the problem of identity authentication and access control for meteorological data storage and sharing in cloud computing environment, an access control model of attribute encryption based on multiple authorization is proposed. This model adopts a kind of attribute encryption scheme which is suitable for large data in cloud environment, solves the problem of fine-grained access control of data in meteorological department, and introduces the concept of global ID and multiple authorization mechanism to solve ...

dynamic management and energy saving strategy of cloud storage replicas based on user access characteristics

dynamic management and energy-saving strategy of cloud storage replicas based on user access characteristics Wang Jinying Yu Yu Yingchang Sweet Lu Liang Bann in view of the problem of the serious waste of server utilization in cloud computing environment, this paper presents a dynamic management and energy saving strategy of cloud storage replicas based on user access feature. By transforming the user access characteristics into computing block's access heat, the Datanode actively applies for hibernation to achieve energy saving according to the overall access heat of the node. dynamic management and energy saving strategy of cloud storage replicas based on user access characteristics

Research on access control technology based on negation rule in cloud computing

Research on access control technology based on negation rule in cloud computing the security and privacy protection of Wu Zhengxue data poses great challenges to the cloud computing field, and a access control technique based on negative rules is proposed to realize the sharing of some data among cooperative enterprises in a cloud environment without involving confidential information. The main idea is to prevent illegal access by judging whether the access query is authorized and whether there is conflict between the authorization and the negative rule. Theoretical analysis and experimental results show that this mechanism can effectively guarantee the security of cloud data. Research on access control technology based on negation rule in cloud computing

A cloud access control system based on privacy protection

A cloud access control system based on privacy protection Nanjing University of Posts and telecommunications Shaojiu This paper presents a new access control model in cloud computing environment, which can not only provide efficient and flexible access control strategy in complex and changeable cloud environment, but also have the ability to protect the privacy data in Mah-abe. This paper focuses on the principle of the ABE encryption algorithm, in the attribute allocation and multi-attribute authority, attribute cancellation three models to do the algorithm to improve, from the performance and security of a number of angles to design a suitable for the cloud computing environment access control model.

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.