Access Control

Discover access control, include the articles, news, trends, analysis and practical advice about access control on alibabacloud.com

Nginx Module Reference manual: HTTP access control module

These modules are all compiled into Nginx by default unless a module is manually specified to be excluded in configure. This module provides simple host-based http://www.aliyun.com/zixun/aggregation/38609.html "> Access control." Nginx_http_access_module This module can be accessed by checking client IP for access control. Control rules are checked in the order they are declared, and the first matching IP access rule will ...

Siremis Web Management Interface 3.2.1 Publishing Web Management interface

Siremis is a Web management interface for Kamailio (OpenSER). Its main features include: User subscriptions, database aliases, speed dial management, bit table view, scheduler, prefix domain conversion, and lowest cost routing management, http://www.aliyun.com/zixun/aggregation/38609.html "> Access control lists (user groups) and Rights management, accounting records, missed calls, call data record view, hash table, dial schedule ...

Windows Azure Real Case: Invensys Operations Management-Company uses Windows Azure AppFabric to realize a dynamic energy-efficient smart grid

Invensys Operations Management Invensys Operations Management decided to make it easier for small American power companies and less money to participate in the smart grid (the U.S. government-supported energy modernisation program). Power companies need high-performance, low-cost ways to release real-time electricity data to users, making it easier for users to spend their first time making decisions. Invensys uses service bus and access control ...

NFC provides users with electronic Payment account Services

The account service of electronic payment for users based on Near Field communication technology (NFC) go out without your wallet, as long as the pocket is carrying a mobile phone, you can take the bus, take the subway, can be in convenience stores, supermarkets, shopping malls swipe, and even in the office area to brush access control ... This kind of life scene, we have been imagining for many years. Yesterday, China Telecom United domestic banks announced that, from December 23 onwards, with the support of NFC-enabled mobile phone users, can be free in China Telecom Business Hall to replace a mobile phone card to support NFC, open mobile phone wallet, the wallet in the bank card, bus ...

Policy Daemon 2.0.12 Publish multi-platform Policy server

Policy Daemon is a multi-platform policy server for MTA, designed primarily for large messaging host environments. The primary goal is to achieve http://www.aliyun.com/zixun/aggregation/12915.html "> spam crackdown and e-mail compliance while maintaining portability, stability, and high performance at the same time as possible." Its functions include group detailed strategy and specification, access control, EHLO check (helo random ...

A SDN architecture for cloud computing services

A SDN architecture for cloud computing business Zhang Wang Yang as the application of migrating to the cloud and the rapid growth of the number and type of business, networking capabilities are becoming increasingly important. The networking support provided by the cloud service provider and the cloud controller platform has developed rapidly. However, in most cloud networking service models, users must configure the various network layer constructs (such as switches, subnets, and access control lists) for use by cloud applications. This paper presents a service-level network model which can provide more advanced connectivity and policy abstraction required by cloud applications. Source: 2013 China Communication Science ...

Freeside 2.3.3 Release Billing software

Freeside is an open source billing, http://www.aliyun.com/zixun/aggregation/8856.html "> Customer Relationship Management and ticketing package for Internet service providers, Internet telephony, virtual hosts, services, Content providers and other online businesses. Freeside 2.3.3 This version updates a new customer repeat check option, new access control and billing event conditions, and tracks March 8, 13 update requests. Software Letter ...

[Document] A ciphertext policy attribute base encryption scheme for cloud storage

In this paper, a cryptographic scheme for cloud storage is Liu, in which there is a lack of fine-grained access control, difficulty in key management, and difficult to resist collusion attack in the application environment of Yang Mingyun storage, a new ciphertext policy attribute base encryption for cloud storage is proposed (Ciphertext-policy attribute-based encryption, Cp-abe) program. By introducing the license attribute of the main independent control of the data, constructing the Cp-abe scheme of the different attribute domains can prevent the cloud storage system ...

Research and implementation of security mechanism among cloud computing client virtual machines

Research and implementation of security mechanism among cloud computing client virtual machines The flexible services provided by the Choran Hu Junrong cloud computing rely on the support of virtualization technology, but the security problems of virtualization technology also pose a serious threat to the security of cloud computing. In view of the security risks faced by the client operating system in the cloud computing virtualization technology, based on the analysis of the requirements and characteristics of cloud computing virtualization technology, this paper designs the centralized management of cloud computing environment, the forced access control of distributed implementation and the isolation mechanism based on cloud resource control to make it cooperate with each other. Ensure the security of the client operating system in cloud computing and make the ...

Windows Azure AppFabric Introductory Teaching series (i): Creating AppFabric Projects and namespaces

Starting today, we will launch the Windows Azure AppFabric Introductory teaching article, from the beginning to the other, so that we can gradually understand and master Windows Azure AppFabric. Before we begin our study, we recommend that readers read first: AppFabric Chinese and English white papers. We know that APPFABIRC consists of service bus and Access Control service, and in order to use these features and features, as well as subsequent AP ...

Windows Azure AppFabric Introductory teaching series (IV): Introduction to SWT and OAuth wrap

This article is the fourth article in the introductory teaching of Windows Azure AppFabric. We know that the access Control service in AppFabric uses SWT and OAuth WRAP in the authentication process, so in order to better understand the internal principles of ACS, we will briefly introduce the SWT and OAuth WRAP protocols in this tutorial. Simple Web Token (swt) SWT Introduction: Simple Web Toke ...

389 Directory server 1.2.10.4 publishes Linux directory servers

389 directory server is a full-featured, compliant, LDAPV3 Linux directory servers that evolve from Fedora directory server. In addition to standard LDAPV3 operations, it also supports multiple master replications, fully online configuration and management, links, virtual properties, http://www.aliyun.com/zixun/aggregation/38609.html in Data "> Access control directives, Virtual list view, ...

Opendocman 1.2.6 Release Document management system

Opendocman is a web-based multifunctional http://www.aliyun.com/zixun/aggregation/7453.html "> Document management System (DMS), written in PHP and designed to conform to ISO 17025 /iec Standard. Main features include: Automatic installation scripts, custom themes, Plug-ins, check-in/out, module access control, file auditing, user access control, and excellent search capabilities. Open ...

Windows Azure AppFabric Introductory Teaching series (II): A simple service Bus example

This is the second article in the introductory teaching of Windows Azure AppFabric, which can be said to be a formal beginning to learn appfabric. For subsequent learning to proceed smoothly make sure that you have browsed through the first article of this tutorial, and that you have completed the creation of the AppFabric project and namespace in this article. As we know, APPFABIRC is made up of service bus and Access Control service. This teaching with a simple echo program to give you a brief introduction ...

A trusted cloud storage Control model based on Peer-to-peer

A peer-to-peer-based trusted cloud storage Control model Zhu Jian Wang Wang cloud storage is the ideal storage information technology in cloud computing. The paper aims at the bottleneck problem of cloud storage mainly using centralized architecture, and combines the main ideas of Peer-to-peer technology. A trusted cloud storage Control model based on Peer-to-peer is proposed. This model not only improves the performance of cloud storage, but also uses trusted computing technology to enhance the privacy security of access control and data storage of cloud users, and analyzes the security of the proposed model. A trusted cloud storage Control model based on Peer-to-peer

Siremis Web Management Interface 2.1.0 Release

Siremis provides a web management interface for Kamailio (OpenSER). Its order functions include: Database alias, speed dial management, bit table view, dispatch, prefix domain conversion, and lowest cost routing management, http://www.aliyun.com/zixun/aggregation/38609.html > Access control lists (user groups) and Rights management, accounting records, missed calls, call data record views, hash tables, dial schedules, and user preferences ...

Analysis of key technologies of cloud computing security

Analysis of cloud computing security key Technologies Guo Yupeng The advent of cloud computing enables enterprises and individuals to easily use computing and storage resources in the cloud through the network, the problem of data security in cloud computing has attracted more and more attention. This paper discusses the goal and requirements of cloud computing security, the user access, encryption technology, access control in cloud computing   , virtualization security and other key security technologies are analyzed. Temp_12081509334439.pdf

Mainstream application scenarios and considerations for cloud technology

The word "cloud" in the recent security industry repeatedly appeared, cloud computing, cloud storage, cloud services and other words become popular, this should be attributed to the development of Internet mobile technology.   Cloud technology in the monitoring, access control, intelligent transportation, Intelligent City, smart home and other applications is also the formal current mainstream. Cloud storage monitoring data of cloud storage the development of security monitoring technology has experienced three stages of simulation, digitalization and networking. The birth of Network Monitor solves the problem that traditional monitor long-distance transmission effect, also changed the traditional connection way, make it simpler, more convenient, but simultaneously yan ...

Nginx Series Tutorials: Nginxhttpownermatch modules (resolve linked file cross-station access)

Overview This module provides a simple file based on the owner's http://www.aliyun.com/zixun/aggregation/38609.html "> Access control." The Nginx_http_owner_match_module module allows it to control the access of specific files to the owner and organization. Access rule checks are based on the order in which they are declared. Configuration Example: Location/{Omallow Heihe ...

Gorgeous turned from "internet addiction teenager" to Army network engineer

Not long ago, the Xinjiang military Region Automation station Staff Sergeant Wei Mongmong through the network Engineer examination, now has become a veritable "soldier network engineer."  In the work, Wei is the pillar of information construction of the army, his troops all over Xinjiang more than 10 points a large and complex LAN system, command automation systems, access control systems, monitoring systems are clear in the chest, freely.  But who knows, today's "network engineer" Wei-Misty, once obsessed with online games, people become "internet addiction teenager", and even bungled the study, failed to enter the university. After the Wei-Misty University failed, ...

Total Pages: 10 1 2 3 4 5 6 .... 10 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.