資源描述:
《面向個(gè)人隱私泄露的訪問(wèn)控制及應(yīng)用研究》由會(huì)員上傳分享,免費(fèi)在線閱讀,更多相關(guān)內(nèi)容在學(xué)術(shù)論文-天天文庫(kù)。
1、分類(lèi)號(hào):TP309密級(jí):公開(kāi)論文編號(hào):2013021456貴州大學(xué)2016屆碩士研究生學(xué)位論文面向個(gè)人隱私泄露的訪問(wèn)控制及應(yīng)用研究學(xué)科專(zhuān)業(yè):計(jì)算機(jī)軟件與理論研究方向:密碼學(xué)與可信計(jì)算導(dǎo)師:彭長(zhǎng)根研究生:李甲帥中國(guó)﹒貴州﹒貴陽(yáng)2016年06月目錄目錄................................................................................................................................I摘要.......................................
2、......................................................................................IIIAbstracts......................................................................................................................V第1章緒論........................................................................
3、.......................................11.1訪問(wèn)控制技術(shù)概述.........................................................................................11.2個(gè)人隱私泄露概述.........................................................................................11.3大數(shù)據(jù)平臺(tái)Hadoop安全概述..................................
4、....................................21.4研究現(xiàn)狀及存在的問(wèn)題.................................................................................41.4.1訪問(wèn)控制及個(gè)人隱私泄露國(guó)內(nèi)外現(xiàn)狀.......................................................41.4.2傳統(tǒng)統(tǒng)訪問(wèn)控制模型存在的問(wèn)題..............................................................61.5
5、課題的研究目的及意義.................................................................................71.6論文組織結(jié)構(gòu).................................................................................................81.7本章小節(jié)........................................................................................
6、.................8第2章相關(guān)基礎(chǔ)知識(shí)及技術(shù)................................................................................102.1信息熵基礎(chǔ)...................................................................................................102.2Kerberos認(rèn)證機(jī)制機(jī)制........................................................
7、........................112.3SparkStreaming大數(shù)據(jù)實(shí)時(shí)計(jì)算技術(shù)........................................................132.4數(shù)據(jù)庫(kù)鏈接池...............................................................................................142.5本章小結(jié).............