English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51615541      Online Users : 626
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/65515


    Title: 合作式代理人對機密性資訊存取機制之研究
    Other Titles: The Study of Classified Information Access with a Collaboration Agent Scheme
    Authors: 林忠毅;林鳳儀;方自億;甯方璽
    Lin, Zhong-Yi;Lin, Fengyi;Fang, Tzu-Yi;Ning, Fang-Shii
    Contributors: 地政系
    Keywords: 代理人;互動式識別方法;門檻方法;機密性資訊
    annular reverse-flow combustor;inlet pressure;swirl intensity
    Date: 2011.05
    Issue Date: 2014-04-18 17:11:18 (UTC+8)
    Abstract: 資訊科技除了帶來許多正面效益, 相對地, 也帶來許多負面的影響. 就具機敏性資料庫存取而言, 若未有任何安全機制, 攻擊者欲竊取資料, 如同進入無人之境;即使資料庫存取, 具有完善權限密碼機制, 也無法防範管理者監守自盜或密碼遭竊取風險. 故本研究以代理人環境結合「互動式識別方法」、「門檻方法」機制, 達成二階層式的資料防護及遠端資料庫管理人員間相互認證, 並透過門檻機制, 當達到門檻人數, 才能將資料庫解開, 以解決單一管理鑰匙可能衍生之威脅.
    Information technology not only has provided us countless positive benefits, on the contrary, also has brought us lots of negative effects. Take classified information for example, if the files are kept without any security protection, hackers can easily gain access to it. Nevertheless, even if the data is encrypted with password and other protection, it’s still hard to avoid the risk the corruptive administrator from stealing the files.Thus, this research applies the Interactive Identification Scheme and the Threshold Scheme in the agent’s procedure, which may develop the system into a 2-layer protection and create a mutual remote database administrator authentication. Through the use of Threshold Scheme, the access of the database can only decoded only if the threshold of administrators or agents are adequate. This way, the protract risk of only a singular administrator can be solved.
    Relation: 中正嶺學報, 40(1), 107-117
    Data Type: article
    Appears in Collections:[地政學系] 期刊論文

    Files in This Item:

    File Description SizeFormat
    107-117.pdf543KbAdobe PDF2718View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback