Learn More
JSF is a true MVC pattern, its key point is the Web presentation layer. It not only provides a wealth of web page controls but also supports the development for controls, so its use is convenient and flexible. It allows programmer design Web program through dragging controls to the Web page, its using is very simple while the designed page is beautiful, it(More)
Provenance is meta-data about how data items become what they are. A variety of provenance-aware access control models and policy languages have been recently discussed in the literature. However, the issue of eliciting access control requirements related to provenance and of elaborating them as provenance-aware access control policies (ACPs) has received(More)
Access control of sensitive resources is a widely used means to achieve information security. When building large-scale systems based on popular commercial component middleware, such as J2EE, a usual way to enforce access control is to define access control configurations for components in a declarative manner. These configurations can be interpreted by the(More)
Access Control Requirements (ACRs) are software requirements about limiting privileges of users from accessing sensitive software resources. ACRs often interact with functional requirements (FRs), conform to an access control model, are constrained by authorization constraints of organizations, and change frequently. Current requirements modeling(More)
Provenance is a directed graph that captures historical information about data items in Provenance-Aware Systems (PAS). A variety of access control models and policy languages specific to PAS have been recently discussed in literature. However, it is still not clear how to efficiently specify provenance-aware access control policies and how to effectively(More)
The Net disc is a kind of online storage service on the internet, it provides files storage, access, backup, sharing and other file management functions to users. today with the rapid network development it has strong practicability. This paper analyze the main functions and implementation principle of the Net disk, and realized the Net disk through(More)