期刊文献+

基于VR技术的实验室安全准入平台设计 被引量:2

Design of Laboratory Security Access Platform Based on VR Technology
下载PDF
导出
摘要 实验室是高校开展教学的重要场所,是培养高技能型人才和创新型人才的主要阵地,其安全性能需要进一步提高。为此,提出基于VR技术的实验室安全准入平台设计。为满足用户操作需求,设计应用虚拟仿真技术的平台总体框架及平台预约模块,实现平台与服务器端及平台各个功能的通信交流。实验结果表明:实验室安全准入平台的安全培训效果较好。 Laboratory is an important place to carry out teaching in Colleges and universities,and is the main position to cultivate high skilled and innovative talents.Its safety performance needs to be further improved.Therefore,the design of laboratory security access platform based on VR technology is proposed.In order to meet the operational requirements of users,the overall framework and reservation module of virtual simulation platform are designed to realize the communication between the platform and the server as well as various functions of the platform.The experimental results show that the safety training effect of laboratory security access platform is better.
作者 闫伟 YAN Wei(Institute of Information Engineering,Suqian College,Suqian Jiangsu 223800,China)
出处 《信息与电脑》 2020年第23期115-116,共2页 Information & Computer
基金 江苏省教育科学“十三五”规划课题——基于虚拟仿真实验室安全教育的应用研究(项目编号:D/2020/01/12)。
关键词 VR技术 实验室 安全准入 VR technology laboratory safe access
  • 相关文献

参考文献3

二级参考文献39

  • 1曹洁梅,罗荣兰,梁海韵,赵卫,朱利.某医科大学学生对实验室生物安全认知情况的调查分析[J].中国病毒病杂志,2008,10(4):279-281. 被引量:12
  • 2Yuan E, Tong Jing. Attribute Based Access Control(ABAC) for Web Services[C].Proc. of the IEEE International Conference on Web Services. Piscataway, USA: IEEE Computer Society, 2005:561-569.
  • 3Perlman R. An Overview of PKI Trust Models[J]. IEEE Network, 1999, 13(6): 38-43.
  • 4Lang Bo, Foster I, Siebenlist F, et al. Attribute Based Access Control for Grid Computing[EB/OL].ftp://info.mcs.anl.gov/ pub/tech_reports/ reports/P1367.pdf, 2006-04-25.
  • 5Park J S, Sandhu R. Smart Certificates: Extending X.509 for Secure Attribute Service on the Web[C].Proc. of National InformationSystems Security Conference. Arlington, USA: [s. n.], 1999:340-346.
  • 6OASIS. eXtensible Access Control Markup Language(XACML) Version 2.0[EB/OL].docs.oasis-open.org/xacml/2.0/ access_control-xacml-2.0- core-spec-os.pdt, 2005-02-01.
  • 7Ragsdale D J, Surdu J R, Carver C A.Information assurance education through active leaming[R].The IWAR Laboratory, 2002.
  • 8de Vivo M, de Vivo G O, Isern G.Internet security attacks at the basic levels[J].Operating Systems Review, 2002, 32(2):111-116 .
  • 9Teo L, Zheng Y, Ahn G.Intrusion detection force: an infrastructure for internet- scale intrusion detection[C].Proceedings of the First IEEE International Workshop on Information Assurance(IWIA'03) , Darmstadt, Germany, 2003:73- 91.
  • 10BJORLIN M.A study of modeling and simulation for computer and network security[R].Stockholm: University of Stockholm / Royal Instituteof Technology, 2005.

共引文献64

同被引文献20

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部