²é¿´: 1218  |  »Ø¸´: 5
±¾Ìû²úÉú 1 ¸ö ·­ÒëEPI £¬µã»÷ÕâÀï½øÐв鿴

ghost_game

Òø³æ (ÕýʽдÊÖ)

[ÇóÖú] °ïæ·­ÒëÕªÒªÖеÄ2¾ä»°~~~~

Ô­ÎÄ£º
Ìá³öÒ»ÖÖ½«ÐÅÈζÈÓë²ÎÊý»¯Ô¼ÊøÏà½áºÏµÄƾ֤Á´·¢ÏÖËã·¨£¬Ä£ÄâʵÑé±íÃ÷£¬¸Ä½øºóµÄËã·¨¿ÉÒÔÓÐЧµØ¶Ô²»Á¼ÊµÌåµÄÇëÇó½øÐÐÆÁ±Î£¬ÊµÏÖÁ˽ÏÁé»îµÄϸÁ£¶ÈÊÚȨ£¬Í¬Ê±¸ÃËã·¨Ìá¸ßÁ˼ÆËãЧÂÊ£¬¼õÉÙÁ˽¨Á¢Æ¾Ö¤Á´ËùºÄ·ÑµÄ¿Õ¼ä¡£
ÎÒÃǶ¼ÔÚ²»¶Ï¸Ï·Íü¼ÇÁ˳ö·£¬ÔÚʧÍûÖÐ×·Çóż¶ûµÄÂú×ã¡£
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

fjtony163

°æÖ÷ (ÎÄ̳¾«Ó¢)

Ã×Ã×

ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
°®ÓëÓêÏÂ(½ð±Ò+1): 2011-11-13 19:34:57
sltmac(½ð±Ò+5): 2011-11-22 10:09:34
sltmac(·­ÒëEPI+1): 2011-11-22 10:09:38
Propose a discovery algorithm of credential chain to combine trust rank with parameterization constraints. Model exam showed that improved algorithm can shield efficiently to requests from adverse entity and realized acuter fine grain authorization. It also increased calculation efficiency and reduced used space for constructing credential chain.
2Â¥2011-11-13 18:58:51
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

alvarohao

Ìú¸Ëľ³æ (ÖøÃûдÊÖ)

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
°®ÓëÓêÏÂ(½ð±Ò+1): 2011-11-13 19:35:04
sltmac(½ð±Ò+5): 2011-11-22 10:09:42
A credential chain discovery algorithm based on the combination of the trust rank and the parameterized constraints was proposed. The simulation showed that the modified algorithm can effectively shield the requests from the undesirable entities, achieving the fine grit authorization in a rather flexible way. And simultaneously, this algorithm enhanced the computing efficiency and reduced the space to build the credential chains.
ÇóŒ?„“У¬„îÖ¾ˆD?Š£¡
3Â¥2011-11-13 19:04:47
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

xiulongfei

ľ³æ (Ö°Òµ×÷¼Ò)

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
°®ÓëÓêÏÂ(½ð±Ò+1): 2011-11-17 10:04:32
sltmac(½ð±Ò+5): 2011-11-22 10:09:49
An algorithm to discover credential chains ,combining trust level with parametric constraints, was brought forward.The simulation experiment shows that the improved algorithm can effectively shield requests of bad entities to realize the flexible fine grit available, meanwhile it increased computing efficiency and reduced the spaces of setting up credential chains.
ÈË»îמÍÒª¿ªÐĵã
4Â¥2011-11-17 09:52:18
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

wgz0625

ľ³æ (СÓÐÃûÆø)

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï ¡ï
°®ÓëÓêÏÂ(½ð±Ò+1): 2011-11-18 13:33:21
sltmac(½ð±Ò-6): ³­Ï® 2011-11-20 11:23:52
Propose a discovery algorithm of credential chain to combine trust rank with parameterization constraints. Model exam showed that improved algorithm can shield efficiently to requests from adverse entity and realized acuter fine grain authorization.And simultaneously, this algorithm enhanced the computing efficiency and reduced the space to build the credential chains.
5Â¥2011-11-18 12:37:58
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

fjtony163

°æÖ÷ (ÎÄ̳¾«Ó¢)

Ã×Ã×

ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷

ÒýÓûØÌû:
5Â¥: Originally posted by wgz0625 at 2011-11-18 12:37:58:
Propose a discovery algorithm of credential chain to combine trust rank with parameterization constraints. Model exam showed that improved algorithm can shield efficiently to requests from adverse  ...

5Â¥ÄãÕâ¸ö´ð°¸Ç°Á½¾ä»°Ôõô¸úÎÒһģһÑù°¡¡£¡£¡£¡£×îºóÒ»¾äÔõô¸ú3Â¥·­ÒëһģһÑù°¡¡£
6Â¥2011-11-20 09:01:39
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ ghost_game µÄÖ÷Ìâ¸üÐÂ
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û