Grid system has secure requirements of confidential communication, data integrity and non-repudiation. According to the secure requirements for Grid service, the paper proposed an identity -based encryption scheme for...
详细信息
Trust model is the foundation of the whole secure architecture because it determines the trust form adopted and the risk to adopt it in network. So the research of trust model in PKI has been the hot spot of PKI techn...
详细信息
This article aimed to investigate the affection of diverse social backgrounds to language attitudes, language use situation and living environment in South Xinjiang region. This article surveyed 45 in
This article aimed to investigate the affection of diverse social backgrounds to language attitudes, language use situation and living environment in South Xinjiang region. This article surveyed 45 in
作者:
Janakiraman MoorthyRangin LahiriNeelanjan BiswasDipyaman SanyalJayanthi RanjanKrishnadas NanathPulak Ghosh(Coordinator) Director and Professor of Marketing at the Institute of Management Technology
Dubai. Earlier he was Professor of Marketing at the IIM Calcutta and IIM Lucknow. He received his PhD from IIM Ahmedabad. His recent research papers were published in the leading scholarly ournals such as Marketing Science British Food Journal Journal of Information Technology Case and Application Research Journal of Database Marketing & Customer Strategy Management. He has wide experience in the banking and investment industry. He was earlier the Global Research and Project Director of the Institute for Customer Relationship Management Atlanta USA. He was the Convener of the prestigious CAT Exam 2011. e-mail: Practice Director
leading Atos India's CRM practice while supporting Strategic Business Development for North American Market. With an experience of more than 15 years Rangin has worked extensively as a Business Consultant in Information Technology (Sales Automation Marketing & Service Management area) Customer Data Management and CRM Analytics. e-mail: Business Consultant at Atos with extensive experience in Business Analysis
Risk Management Analytics Business Development Presales Solution Ideation on Enterprise Data Management Enterprise Reference Data and Master Data Management area. e-mail: founder and CEO of dono consulting
a boutique quantitative analytics and investment research firm. He has worked for leading financial firms in New York and India including Dow Jones Blackstone Sorin Capital (VP Quantitative Modeling) and Thomson Reuters (Head of Real Estate Analytics). A CFA charter holder and Commonwealth Scholar Deep has an MS (Applied Economics) from University of Texas Dallas and an MA (Economics) from Jadavpur University e-mail: Professor in the Information Systems Group of the Institute of Management Technology
Ghaziabad. Her PhD is in the field of data mining from Jamia Millia Islamia Central University India. She has published five edited books. She is serving on the editorial b
Retrieval technology has been widely used, but most of the current retrieval models are based on the logic matching of characters without considering user's query requirements and objectives in semantic level, whi...
详细信息
In the past few years, video has become one of the most powerful engines to push communications forward. The increasing of digital video technology requires larger and larger bandwidth for various applications, such a...
详细信息
In the past few years, video has become one of the most powerful engines to push communications forward. The increasing of digital video technology requires larger and larger bandwidth for various applications, such as IPTV, VOD, video phone, mobile search, etc. The goal of this Feature Topic column is to present and highlight the latest progress and future video-related technologies. We hope this
Access control is one of the main strategies for Network security prevention and protection. Its main task is to fully share system resources, manage user's access rights, to ensure that network resources not from...
详细信息
Access control is one of the main strategies for Network security prevention and protection. Its main task is to fully share system resources, manage user's access rights, to ensure that network resources not from...
详细信息
Access control is one of the main strategies for Network security prevention and protection. Its main task is to fully share system resources, manage user's access rights, to ensure that network resources not from unauthorized access and use. Discretionary Access Control model is only suitable for small, closed application environment; Most of mandatory access control policy applied in the military field; In contrast, role-based access control policy is to implement security policies for enterprise access control is an effective way, currently, RBAC gained widespread applied in the rights management of large database systems. This paper via research on access control matrix, access control lists, access control capabilities lists, mandatory access control policy, role-based access control model and access control in Grid environment, detailed analysis of the current network access control mechanisms and application fields, pointed out these kinds of access control model and the advantages and disadvantages in the application of some of the issues that need attention.
With the advent of the information society, various archives management software has seriously affected the development of the whole system. In the development of archives management information system, the first step...
详细信息
暂无评论