期刊文献+

船舶信息传输网络的安全访问算法研究 被引量:1

Research on secure access algorithm for ship information transmission network
下载PDF
导出
摘要 为保证舰船通信安全性,提出一种基于统计学的船舶信息传输网络的安全访问算法。建立船舶信息传输网络访问控制矩阵,生成基于安全控制的多角度模型,实现多用户之间的资源共享控制,通过建立船舶信息传输网络并发多媒体负载访问的排队模型,并利用统计学对访问请求允许最大时间的统计概率与船舶信息传输网络中并发多媒体应用数量之间关系进行计算,实现基于统计学的船舶信息传输网络的安全访问算法。实验结果表明,所提算法能够有效提高舰船网络访问控制的安全性。 In order to guarantee the ship's communication security, a security access algorithm based on statistical ship information transmission network is presented. Established ship information transmission network access control matrix, the model based on safety control of the multiple perspectives, achieve resource sharing between multiple user control, through the establishment of ship information transmission network queuing model of concurrent access multimedia load, and by using the statistical access request to allow maximum time of statistical probability and ship information transmission network and multimedia application quantity calculated, the relationship between implementation is based on statistical information transmission network security access algorithms of the ship. The experimental results show that the proposed algorithm can effectively improve the security of ship network access control.
作者 刘伯忠
出处 《舰船科学技术》 北大核心 2017年第20期132-134,共3页 Ship Science and Technology
关键词 船舶信息传输网络 安全访问 算法研究 ship information transmission network secure access algorithm research
  • 相关文献

参考文献7

二级参考文献39

  • 1靳超,郑纬民,张悠慧.主动存储系统结构[J].计算机学报,2005,28(6):1013-1020. 被引量:4
  • 2王修君,沈鸿.一种基于增量学习型矢量量化的有效文本分类算法[J].计算机学报,2007,30(8):1277-1285. 被引量:14
  • 3赵跃龙 蒋骞.基于智能网络磁盘的虚拟存储技术的研究与设计.计算机研究与发展,2009,46:44-49.
  • 4Yamamoto K,Carusone A C. A 1-1-1-1 MASH Delta-Sig.ma Modulator With Dynamic Comparator-Based OTAs[J].Solid-State Circuits,2012, 47(8):1866-1883.
  • 5https://www.dropbox.com.
  • 6https://skydrive.live.com.
  • 7http://www.ksyun.com.
  • 8http://yunpan.360.cn.
  • 9Lim H,Kapoor V,Wighe C.Active disk file system:Adistribu-ted,scalable filesystem[C]∥Proceedings of the Eighteenth IEEE Symposium.Washington,DC:IEEE Computer Society,2001:101-114.
  • 10Swank J D,Goodson G R,Scheinholtz M L,et al.Self-securing storage:Protecting data incompromised systems[C]∥Proc of the 4th Symposium on Operating Systems Design and Implementation.Berkeley,CA:USENIX Association,2000:12-26.

共引文献20

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部