笔式用户界面软件以其自然、高效的交互方式,在很多领域中有着广泛的应用.笔式用户界面软件具有以交互为中心、用户个性化需求高的特点,由此也决定了用户在软件设计中的主导地位.以用户为中心的设计的关键问题在于,如何使用户的思想如...笔式用户界面软件以其自然、高效的交互方式,在很多领域中有着广泛的应用.笔式用户界面软件具有以交互为中心、用户个性化需求高的特点,由此也决定了用户在软件设计中的主导地位.以用户为中心的设计的关键问题在于,如何使用户的思想如实地反映到设计中.通过建立笔式用户界面软件特征模型PUIDM(the domain model for pen-based user interface software),构造了一个连接用户与软件设计的平台.从上下文、软件实体、界面特征、体系结构等角度,对该模型的建立进行分析,并给出了相应的XML描述.在此基础上,描述了用户使用该模型进行软件设计的过程.实例表明,PUIDM能够正确引导用户进行设计,将用户意图充分地引入到软件设计和最终实现中,使软件满足可用性要求.展开更多
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us...For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.展开更多
文摘笔式用户界面软件以其自然、高效的交互方式,在很多领域中有着广泛的应用.笔式用户界面软件具有以交互为中心、用户个性化需求高的特点,由此也决定了用户在软件设计中的主导地位.以用户为中心的设计的关键问题在于,如何使用户的思想如实地反映到设计中.通过建立笔式用户界面软件特征模型PUIDM(the domain model for pen-based user interface software),构造了一个连接用户与软件设计的平台.从上下文、软件实体、界面特征、体系结构等角度,对该模型的建立进行分析,并给出了相应的XML描述.在此基础上,描述了用户使用该模型进行软件设计的过程.实例表明,PUIDM能够正确引导用户进行设计,将用户意图充分地引入到软件设计和最终实现中,使软件满足可用性要求.
文摘For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services.