共查询到20条相似文献,搜索用时 46 毫秒
1.
在设计网页时,经常涉及到取存数据库里保存的图形,如人员或商品的照片.其程序设计由于要使用许多ASP的对象和方法,因此要比存取数据库里的文本内容复杂得多.本文以带有上载照片功能的会员注册程序为例,介绍用ASP中的request对象的binaryread方法和recordset对象的appendchunk方法、以及response对象的binarywrite方法和getchunk方法存取ACCESS数据库照片的程序文件系统,并给出关键程序代码. 相似文献
2.
阐述了大对象数据类型在Oracle数据库的实现方式,探讨了用PB存取Oracle数据库中图片资料的方式,并给出了社会保险管理信息系统中图片资料保存和显示的程序代码,强调了程序代码的关键点。 相似文献
3.
4.
5.
基于Web的SQL Server数据库存取图片的Delphi实现 总被引:1,自引:0,他引:1
在开发基于网络的数据库信息系统当中,经常会遇到要求向数据库信息系统当中存入或取出图片的问题,讨论了向数据库信息系统中存取图片的实现方法.考虑到Delphi编程语言和SQL Server数据库的强大功能和优越性,重点研究了运用Delphi7.0对SQL Server 2000数据库中的image数据类型进行存取的Web实现方法,并给出部分程序代码,这些技巧在开发基于ASP、ASP.NET的网上数据库应用中具有很高的实用价值. 相似文献
6.
用ASP.NET实现对Image数据的存取 总被引:1,自引:0,他引:1
介绍了ADO.NET技术的特点,结合对图片和Office文档上载下载的实例,说明如何在ASP.NET中通过ADO.NET访问网络数据库,讨论ASP.NET对数据库中的image类型数据进行存取的实现方法,并给出部分程序代码。 相似文献
7.
用ASP设计有照片的人事记录的翻页浏览程序 总被引:7,自引:0,他引:7
本文首先分析了在单位内部网实现有照片的人事记录翻页浏览时所遇到的问题,然后简单介绍了解决该问题所使用的ASP和ADO技术,最后以高校学生信息库为例,说明了设计有照片人事记录的翻页浏览程序的方法,并给出了ASP参考程序代码。 相似文献
8.
翁坚毅 《数字社区&智能家居》2005,(7):15-16
提出Powerbuilder实现SQL Server数据库的网络备份和还原的方法,大大降低了系统数据维护的难度.给出并分析实现该方法的部分关键程序代码。 相似文献
9.
10.
11.
12.
Digital editions have some distinct features that are not presentin digital libraries. Therefore it is somewhat worrisome thatthere are far more digital libraries than digital editions.This essay argues that the reason for this is not only a pressuretowards all-inclusiveness but also the fact that scholarly editionsare addressing both scholars and common readers, each of themhaving their own expectations of what a digital edition shouldactually offer. The essay suggests that we should get away fromthe idea of access to data as the principal merit of the editionand suggests a model of criticism instead, meaning that editorsshould represent their work as providing critical points ofview on the texts they are offering, with their actual contentsthrown in. 相似文献
13.
14.
解秀叶 《计算机光盘软件与应用》2011,(10)
门禁系统中的一个重要应用就是车辆出入管理,是利用先进的技术和高度自动化设备,对车辆出入和停车场进行安全、有效的管理.车辆出入管理系统是用于小区内车辆的出入及停放的管理系统,实现对进出车辆的快速自动识别和自动管理. 相似文献
15.
16.
Cloud computing belongs to a set of policies, protocols, technologies through which one can access shared resources such as storage, applications, networks, and services at relatively low cost. Despite the tremendous advantages of cloud computing, one big threat which must be taken care of is data security in the cloud. There are a dozen of threats that we are being exposed to while availing cloud services. Insufficient identity and access management, insecure interfaces and Applications interfaces (APIs), hijacking, advanced persistent threats, data threats, and many more are certain security issues with the cloud platform. APIs and service providers face a huge challenge to ensure the security and integrity of both network and data. To overcome these challenges access control mechanisms are employed. Traditional access control mechanisms fail to monitor the user operations on the cloud platform and are prone to attacks like IP spoofing and other attacks that impact the integrity of the data. For ensuring data integrity on cloud platforms, access control mechanisms should go beyond authentication, identification, and authorization. Thus, in this work, a trust-based access control mechanism is proposed that analyzes the data of the user behavior, network behavior, demand behavior, and security behavior for computing trust value before granting user access. The method that computes the final trust value makes use of the fuzzy logic algorithm. The trust value-based policies are defined for the access control mechanism and based on the trust value outcome the access control is granted or denied. 相似文献
17.
18.
19.
Abstract Back in 1986, dear old Uncle Sydney predicted that one day users on his network would have the power to add users, change system properties, add and delete directories, and generally manage their own environments. We treated him very gently, fitted him with a comfortable (size 44 long) straitjacket, and had him led away for a long rest by the nice men in white coats. I mean, give a user rights? A user at the time was barely considered a living organism, and certainly not someone (or something) capable of handling rights. 相似文献
20.
基于角色的访问控制 总被引:3,自引:0,他引:3
王广慧 《网络安全技术与应用》2002,(9):21-22
基于角色的访问控制(RBAC)是一个最新的授权方案。它通过分配和取消角色来完成用户权限的授予和取消,并且提供角色分配规则。整个访问控制过程被分成两个部分,即访问权限与角色相关联,角色再与用户关联,从而实现了用户与访问权限的逻辑分离。它比强制访问控制(MAC)和自主访问控制(DAC)更适用于非军事的数据处理。本文从以下几方面介绍了基于角色的访问控制:概述,定义,最小特权策略,职责分离和结论。 相似文献