The manner of permission management in Role-Based Access Control is similar to the actual one in application fields, and it greatly simplifies system management. How to define and manage hundreds of permissions, roles...
详细信息
The manner of permission management in Role-Based Access Control is similar to the actual one in application fields, and it greatly simplifies system management. How to define and manage hundreds of permissions, roles,users and relations among them ( all are called RBAC special framework in this article)in large systems is one key problem that models for RBAC must resolve. This article studies the management of RBAC special frameworks, takes the management relations among roles into frameworks, and puts forward Management-Enhanced Model for RBAC. Special frameworks created according to this model are very similar to the management structures in application fields, and can manage themselves. This model also supports dynamic maintenance of management formwork while it is working.
With the development of computer network, Biometrics, as a kind of information security techniques, is thought more and more of. Handwritten signature verification is an effective one. This paper introduces the design...
详细信息
With the development of computer network, Biometrics, as a kind of information security techniques, is thought more and more of. Handwritten signature verification is an effective one. This paper introduces the design and implementation of an on-line handwritten signature verification system which is based on dynamic programming matching algorithm and give a brief evaluation of its performance. The performance of the system is satisfying according to the experiment.
暂无评论