원문정보
초록
영어
The first step of accessing computer systems is typing in a user ID and a password. The user management system of the computer system then authenticates the user. Only after authentication is the user allowed to access the computer system. In addition to authentication, authorization is also performed by user management systems. For Internet TV systems, authorization is extremely important because Internet TV channels and videos should only be accessed by authorized users. Furthermore, user management systems record who accessed which TV channels and videos when and how long. This information is used by the billing system. Therefore, we develop a user management system for Internet TV systems. Our u
목차
1. Introduction
2. Techniques for User Management
2.1. Policy-Based Access Control [2-3]
2.2. Light-Weight Access Control Mechanism [3]
2.3. Access Control for Cloud Computing Systems [3]
2.4. Other Related Works [3]
3. Design
3.1. System Requirements
3.2. Context Diagrams
3.3. Workflows
3.4. User Interface Design
3.5. Database Design
4. Implementation
5. Experiments
7. Conclusions
References