Access Control(AC)is one of the important technologies of System Security and has been widely studied recently because the traditionary AC technologies can' t meet with the security commands of contemporary imform...
详细信息
Access Control(AC)is one of the important technologies of System Security and has been widely studied recently because the traditionary AC technologies can' t meet with the security commands of contemporary imformation system. As a result,the traditionary AC technologies have been developed and some new technologies have been put forward. This paper makes the necessary classification for the more-than-ten-year research results of the AC technology,together with the analysis and predication for the development trend of the AC technology in the future.
Most of the traditional methods of slicing are based on dependence graph. But constructing dependence graph for object oriented programs directly is very complicated. The design and implementation of a hierarchical sl...
详细信息
Most of the traditional methods of slicing are based on dependence graph. But constructing dependence graph for object oriented programs directly is very complicated. The design and implementation of a hierarchical slicing tool model are described. By constructing the package level dependence graph, class level dependence graph, method level dependence graph and statement level dependence graph, package level slice, class level slice, method level slice and program slice are obtained step by step.
暂无评论