Information Security Management based on RBAC and Communication Monitoring Technology
碩士 === 中華大學 === 資訊管理學系碩士在職專班 === 100 === Nowadays, in the workplace, information technology has enormous influences in many enterprises. Computers not only become important devices that people rely on in their daily lives and work, but also become essential tools for enterprises. As the advantages c...
Main Authors: | Ming-Hsine Yu, 余明賢 |
---|---|
Other Authors: | Mei-Yu Wu |
Format: | Others |
Language: | zh-TW |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/27158537345934559514 |
Similar Items
-
Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology
by: Mei-Yu Wu, et al.
Published: (2013-01-01) -
Construction of RBAC-based Web Pages Access Control Mechanism
by: Jin-Shyan Yu, et al.
Published: (2002) -
Study on Information Security of Distributed Sensor Networks Based on RBAC’s Resource Conflict
by: Su Yu, et al.
Published: (2014-08-01) -
A Study On Combining CR-RBAC And I-RBAC
by: Che-Chih Chang, et al.
Published: (2012) -
Novel Decentralized RBAC System based on Blockchain Technology
by: Nong-WeiLi, et al.
Published: (2017)