期刊文献+

模具外协加工中一种技术信息保密模式的研究

Study on a secrecy mode of molds technique information during subcontract production
下载PDF
导出
摘要 在模具外协加工过程中由于信息的拷贝传输和使用,经常会出现模具技术信息被泄漏的问题,为此,提出一种外协加工中的技术信息保密模式。分析该模式的运行流程,并通过硬件设备重组以及开发相应的信息保密系统具体实现该模式。目前,该模式已成功应用于某铸锻企业的模具外协加工业务。 The technique information of molds always leak out during the subcontract production of molds because of transfer and using based on information copying. In order to solve this issue, a new mode of technique information secrecy in subcontract production is presented. The process of this secrecy mode is analyzed, and the realization scheme is brought forward by integrating equipmeut and developing corresponding information system. This new mode is implemented in the subcontract production of a foundry & forge firm successfully.
出处 《现代制造工程》 CSCD 2007年第6期9-11,8,共4页 Modern Manufacturing Engineering
基金 重庆市自然科学基金资助项目(CSTC 2005BB2196)
关键词 外协加工 技术信息 保密模式 保密体系 Subcontract production Technique information Mode of secrecy Secrecy system
  • 相关文献

参考文献7

二级参考文献63

  • 1[1]Z Adamezyk,H Malek.Internet tools supporting creation and management of technological environment of CAD/CAM systems.Journal of Materials Processing Technology,1998,76(1,3)
  • 2[2]K Cheng,D K Harrison,P Y Pan.Implementation of agile manufacturing-an AI and Internet based approach,Journal of Materials Processing Technology,1998,76(1,3)
  • 3WilliamStallings 杨明 胥光辉 齐望东.密码编码学与网络安全,原理与实践(第2版)[M].北京:电子工业出版社,2001..
  • 4Wong C K, Gouda M, Lam S S. Secure group communications using key graphs [ A ]. In: Proceedings of the ACM SIGCOMM[ C] , August, 1998
  • 5Dondeti L R, Mukherjee S. Scalable secure one-to-many groupcommunication using dual encryption[ J]. Computer Communications, 2000,23 (17): 1681 - 1701
  • 6ANSI X9.69. Key Management Extensions[S], 1998
  • 7Carommi G, Kumar S, Schuba C. Virtual enterprise networks: the next generation of secure enterprise networking[ A]. Fourteenth Annual Computer Security Applications Conference [C], Pbonenix, Arizona USA, December, 1998
  • 8Richard D, Neely B. Security architecture development and results for a distributed modeling and simulation system [ A ]. Fourteenth Annual Computer Security Applications Conference[C], Phonenix, Arizona, USA, December, 1998
  • 9U.S. Department of defense. Trusted Computer System E valuation Criteria [ S ], Standard 5200. 28-STD,December, 1985
  • 10Camarinha-matos L M, Afsarmanesh H, Osorio A L. Flexibility and safety in a Web-based infrastructure for virtual enterprises [J].International Journal of Computer Integrated Manufacturing, 2001,14( 1 ) :66 -82

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部