期刊文献+

对计算机网络构建及维护措施的研究 被引量:5

Research on Computer Network Construction and Maintenance Measures
下载PDF
导出
摘要 计算机网络化已经成为了当今社会的主流,信息时代,网络化成为了一个新的交流平台。计算机网络技术在此也得以最大限度的应用与发展,从而实现了世界的网络化时代。实现网络对接,就要进行计算机互联网的建立。而采用最优化的建立思想后,还要在建立后进行定期妥善的维护。网络的建立与维护都非常重要,文章就重点分析了计算机网络的建立与维护。 The computer network has become the mainstream of society, the information age, the network turns into a new communication platform. Computer network technology in this also can maximize the application and the development, thus realizing the world network age. Realization of network connection, to carry out computer Internet is established. The optimization idea of building, but also in the establishment of regular proper maintenance. Network establishment and maintenance is very important, this article focuses on the analysis of the establishment and maintenance of computer network.
作者 丁春晖
机构地区 宁夏医科大学
出处 《煤炭技术》 CAS 北大核心 2014年第1期199-201,共3页 Coal Technology
关键词 计算机 网络构建 网络维护 computer network construction network maintenance
  • 相关文献

参考文献3

二级参考文献18

  • 1Crampton J, Martin K, Wild P. On Key Assignment for Hierar- chical Access Control[C]//Proc. of the 19th IEEE Computer Security Foundations Workshop. Venice, Italy: IEEE Computer Society, 2006.
  • 2Damiani E, De S, Vimercati C, et al. An Experimental Evaluation of Multi-key Strategies for Data Outsourcing[C]//Proc. of SEC'07. [S. L]: Springer-Verlag, 2007.
  • 3Goyal V, Pandey A, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proe. of the 13th ACM Conf. on Computer and Communications Security. [S. L]: ACM Press, 2006.
  • 4Bethencourt J, Sahai A, Waters B. Ciphertext-policy Attribute- based Ettcryption[C]//Proc. of IEEE Symposium on Security and Privacy. [S. L]: IEEE Computer Society, 2007.
  • 5Chang Yancheng, Mitzenmacher M. Privacy Preserving Keyword Searches on Remote Encrypted Data[C]//Proc. ofACNS'05. [S. L]: Springer-Verlag, 2005.
  • 6Malek B, Miri A. Combining Attribute-based and Access Sys- tems[C]//Proc, of the 12th IEEE International Conference on Computational Science and Engineering. [S.L]: IEEE Computer Society, 2009.
  • 7Ostrovsky R, Sahai A, Waters B. Attribute-based Encryption with Non-monotonic Access Structures[C]//Proc. of ACM Conf. on Computer and Communications Security. [S. L]: ACM Press, 2007.
  • 8Yu Shucheng, Ren Kui, Lou Wenjing, et al. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Sys- tems[C]//Proc, of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, 2009.
  • 9洪澄,张敏,冯登国.AB-ACCS:一种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Z1):259-265.
  • 10Hur J, Noh D K. Attribute-based Access Control with Efficient Revocatlon in Data Outsourcing systems[J]. IEEE Trans. on Parallel and Distributed Systems, 2011, 22(7): 1214-1221.

共引文献21

同被引文献22

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部