首页 | 本学科首页   官方微博 | 高级检索  
     检索      

P2P可信网络访问控制建模
引用本文:饶正婵.P2P可信网络访问控制建模[J].铜仁学院学报,2010,12(2):138-140.
作者姓名:饶正婵
作者单位:铜仁学院,数学与计算机科学系,贵州,铜仁,554300
摘    要:P2P技术在互联网中是一种普及应用的技术,其本身存在的缺陷成了安全问题的重中之重。对可信系统体系结构进行剖析,分析了可信网络访问控制出现的问题,提出了一种网络访问控制体系的模型,理论分析和结果表明,该模型在可信访问控制方面较其他模型有较大的突破。

关 键 词:可信网络  体系结构  控制模型

Modeling of P2P Credible Network Access Control
RAO Zheng-chan.Modeling of P2P Credible Network Access Control[J].Journal of Tongren University,2010,12(2):138-140.
Authors:RAO Zheng-chan
Institution:RAO Zheng-chan ( Mathsmatics and Computer Science Department, Tongren University, Tongren, Guizhou 554300, China )
Abstract:P2P technology is one kind of popularized application technology in the Internet. The weakness of P2P itself has become the most serious problem to security. This paper has carried on the analysis to the structure of the credible system, analyzed problems the credible network access control has, proposed one kind of model of network access control system. On the basis of the theoretical analysis, the results show that this kind of model has bigger breakthrough compared with other models in credible access control.
Keywords:credible network  system structure  control model
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号