期刊文献+

基于云计算的船舶货物远程管理系统研究 被引量:1

Research on remote management system of ship cargo based on cloud computing
下载PDF
导出
摘要 随着信息化水平的提高,如何提高船运物流效率是现代航运业的研究热点之一,最重要的是建立一套全流程船舶货物远程管理系统,对整个船舶物流全周期进行监控管理。云平台结合虚拟化、分布式技术将异构网络进行逻辑整合,建立统一的业务服务平台。本文研究船舶货物远程管理信息系统的需求,在此基础上设计基于云架构的货物远程管理系统,对船舶物流中各环节的信息系统资源进行有效整合,最后建立仿真模型并对结果进行分析。 With the development of information technology, how to improve the efficiency of shipping logistics is a key in modern shipping industry, the most important solution is to establish a set of shipping goods in the whole process of remote management system, monitoring and management of the entire ship logistics cycle. Cloud platform combines virtualization and distributed technology to add heterogeneous networks to logical integration, and to establish a unified business service platform. This paper studied the cargo remote management information system needs, on the basis of management system based on the cloud architecture, information system of each link in the effective integration of the logistics, finally established the simulation model and analyzed the result.
出处 《舰船科学技术》 北大核心 2017年第16期151-153,共3页 Ship Science and Technology
关键词 云计算平台 物流远程管理系统 虚拟化技术 cloud computing platform logistics remote management system virtualization technology
  • 相关文献

参考文献2

二级参考文献28

  • 1杨晓帆,陈廷槐,周六丁,蔡兵.系统级概率故障诊断的最小测试数[J].计算机学报,1995,18(8):604-610. 被引量:4
  • 2蔡兵,杨晓帆,陈廷槐.对称比较模型下的系统级故障诊断[J].计算机学报,1995,18(11):858-866. 被引量:6
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1080

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部