期刊文献+
共找到4,741篇文章
< 1 2 238 >
每页显示 20 50 100
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
1
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
2
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
3
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
Comparative analysis of extreme ultraviolet solar radiation proxies during minimum activity levels 被引量:1
4
作者 A.G.Elias C.R.Martinis +4 位作者 B.F.de Haro Barbas F.D.Medina B.S.Zossi M.Fagre T.Duran 《Earth and Planetary Physics》 CAS CSCD 2023年第5期540-547,共8页
Four extreme ultraviolet(EUV)solar radiation proxies(Magnesium II core-to-wing ratio(MgII),Lymanαflux(Fα),10.7-cm solar radio flux(F10.7),and sunspot number(Rz))were analyzed during the last four consecutive solar a... Four extreme ultraviolet(EUV)solar radiation proxies(Magnesium II core-to-wing ratio(MgII),Lymanαflux(Fα),10.7-cm solar radio flux(F10.7),and sunspot number(Rz))were analyzed during the last four consecutive solar activity minima to investigate how they differ during minimum periods and how well they represent solar EUV radiation.Their variability within each minimum and between minima was compared by considering monthly means.A comparison was also made of their role in filtering the effect of solar activity from the critical frequency of the ionospheric F2 layer,foF2,which at mid to low latitudes depends mainly on EUV solar radiation.The last two solar cycles showed unusually low EUV radiation levels according to the four proxies.Regarding the connection between the EUV“true”variation and that of solar proxies,according to the foF2 filtering analysis,MgII and Fαbehaved in a more stable and suitable way,whereas Rz and F10.7 could be overestimating EUV levels during the last two minima,implying they would both underestimate the inter-minima difference of EUV when compared with the first two minima. 展开更多
关键词 solar EUV radiation solar minimum FOF2 solar activity solar EUV proxy
下载PDF
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
5
作者 Caifen Wang Bin Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1857-1878,共22页
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing.One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results.Linearly homomorphic proxy signature(LHPS)is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right.Blockchain has the characteristics of tamper-proof and traceability,and is a new technology to solve data security.However,as far as we know,constructions of LHPS have been few and far between.In addition,the existing LHPS scheme does not focus on homomorphic unforgeability and does not use blockchain technology.Herein,we improve the security model of the LHPS scheme,and the usual existential forgery and homomorphic existential forgery of two types of adversaries are considered.Under the new model,we present a blockchain-based LHPS scheme.The security analysis shows that under the adaptive chosen message attack,the unforgeability of the proposed scheme can be reduced to the CDH hard assumption,while achieving the usual and homomorphic existential unforgeability.Moreover,comparedwith the previous LHPS scheme,the performance analysis shows that our scheme has the same key size and comparable computational overhead,but has higher security. 展开更多
关键词 Homomorphic signature proxy signature security model provable security UNFORGEABILITY
下载PDF
Residual Capacity of Friction⁃Type High⁃Strength Bolted T⁃stub Connection with Nut Corrosion Damage
6
作者 Gangnian Xu Baoyao Lin Yefeng Du 《Journal of Harbin Institute of Technology(New Series)》 CAS 2023年第3期68-84,共17页
Corrosion is a primary cause of the slippage of friction⁃type high⁃strength bolted(FHSB)T⁃stub connections.This paper attempts to quantify the residual capacity of FHSB T⁃stub connections with corroded nuts.Firstly,co... Corrosion is a primary cause of the slippage of friction⁃type high⁃strength bolted(FHSB)T⁃stub connections.This paper attempts to quantify the residual capacity of FHSB T⁃stub connections with corroded nuts.Firstly,corrosion simulation tests were conducted on 48 manually cut nuts to find out the relationship between the damage degree of nut section and the residual clamping force(RCF)of bolt.Then,static load tests were carried out on 24 FHSB T⁃stub connections with nuts of different degrees of damage to obtain the failure modes.By finite⁃element(FE)models,a comparative analysis was performed on the initial friction load(IFL)and ultimate strength(US)of each connection with corroded nuts.Finally,the parameters of 96 FE models for FHSB T⁃stub connections were analyzed and used to derive the calculation formulas for the degree of damage for each nut and the IFL and US of each connection.The results show that the RCF decay of a bolt is a quadratic function of the equivalent radius loss ratio and the shear failure after nut corrosion;the IFL of each connection had a clear linear correlation with the RCF of the corresponding bolts,and the correlation depends on the applied load and static friction on connecting plate interface induced by the clamping force;the static friction had little impact on the US of the connection;the proposed IFL and US formulas can effectively derive the residual anti⁃slip capacity of FHSB T⁃stub connections from the degree of damage of the corroded nut section.The research results provide a scientific basis for the replacement and maintenance of corroded bolts of FHSB T⁃stub connections. 展开更多
关键词 nut corrosion T⁃stub connection high⁃strength bolt sectional damage residual clamping force(RCF) anti⁃slip capacity
下载PDF
The Connection Between Medical Self-determination and the System of Adult Guardianship——The Institutional Construction of Medical Proxy
7
作者 李敏 SU Yilong 《The Journal of Human Rights》 2023年第3期576-598,共23页
China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since pati... China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since patients’capacity to consent is the prerequisite,when the patient is a fully competent person,it is sufficient to give consent based on valid notification by the doctor.However,for those who are unable to give valid consent,especially adult patients with impaired capacity,resolving the legality of the doctor’s medical conduct remains an issue when it infringes on the patient’s body and health.To solve this issue,someone must give consent in place of the patient when the adult is unable to give valid consent.However,the personal and exclusive nature of the right to medical consent,which is informed consent,makes it impossible to simply delegate it to a guardian or other person to exercise it on behalf of the patient.In this paper,we borrow the concept of“medical proxy”proposed by Japanese scholar Teruaki Tayama,and for the first time,we discuss the construction of medical proxy from the perspective of adult guardianship by connecting the two systems from the standpoint of interpretive theory. 展开更多
关键词 medical proxy medical self-determination adult guardianship capacity to consent
下载PDF
局部锈蚀圆钢管混凝土短柱轴压承载力试验研究 被引量:1
8
作者 陈梦成 罗苏昌 +3 位作者 黄宏 方苇 许开成 钱文磊 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2024年第1期317-329,共13页
钢管混凝土(CFST)在服役环境中被腐蚀,导致其钢结构承载力降低,严重威胁到结构的服役性能和使用寿命。首先,采用机加工车铣方法制作模拟局部锈蚀的人工缺陷,然后以钢管外表面局部环向贯通锈蚀位置、锈蚀钢管体积损失率、锈蚀外表面面积... 钢管混凝土(CFST)在服役环境中被腐蚀,导致其钢结构承载力降低,严重威胁到结构的服役性能和使用寿命。首先,采用机加工车铣方法制作模拟局部锈蚀的人工缺陷,然后以钢管外表面局部环向贯通锈蚀位置、锈蚀钢管体积损失率、锈蚀外表面面积损失率(简称锈蚀面积损失率,下同)为试验参数,对45根局部锈蚀圆CFST短柱试件进行轴压承载力试验;其次,分析锈蚀位置、锈蚀钢管体积损失率、面积损失率和壁厚损失率对锈蚀试件承载力、刚度和延性的影响,揭示锈蚀CFST试件破坏机理和承载力退化机制;最后,针对局部锈蚀圆CFST短柱构件轴压承载力提出一个简化实用计算公式。研究结果表明:各试件具有类似的破坏特征,主要呈明显的腰鼓状破坏,且发生在锈蚀区;随着锈蚀钢管体积损失率增大,锈蚀CFST柱的承载力、刚度和延性均出现不同程度的降低;在锈蚀钢管体积损失率和面积损失率相同的情况下,就局部锈蚀位置影响而言,中部影响最大;就锈蚀程度表征参数影响而言,锈蚀钢管体积损失率影响最大,面积损失率次之,壁厚损失率最小;本文提出的简化实用公式可为圆钢管混凝土构件全寿命设计提供参考依据。 展开更多
关键词 圆钢管混凝土短柱 局部锈蚀 轴压承载力 退化机制
下载PDF
单边螺栓连接中心支撑钢框架抗震性能分析
9
作者 蔺新艳 杨新宇 +3 位作者 王新武 孙海粟 刘欢欢 JANG Il Young 《河南理工大学学报(自然科学版)》 CAS 北大核心 2024年第2期166-176,共11页
目的为研究支撑-半刚接钢框架结构体系的抗震性能,方法设计了一榀由嵌套式单边螺栓与T型钢构成的半刚性梁柱节点的中心支撑钢框架,并进行了拟静力试验与有限元数值模拟,通过观测整个试验现象,分析了其滞回、承载力、刚度退化、耗能等抗... 目的为研究支撑-半刚接钢框架结构体系的抗震性能,方法设计了一榀由嵌套式单边螺栓与T型钢构成的半刚性梁柱节点的中心支撑钢框架,并进行了拟静力试验与有限元数值模拟,通过观测整个试验现象,分析了其滞回、承载力、刚度退化、耗能等抗震指标。结果结果表明:试件破坏过程明显经历了弹性段、塑性段、破坏段三个阶段,试件破坏模式主要为支撑受压失稳破坏,塑性变形主要累积在支撑体系上,整体呈现延性破坏特征;支撑断裂后,梁柱及T型钢节点无明显塑性变形,钢框架仍具有较高的安全储备,符合“强节点、弱构件”设计原则,表明了结构具有两道抗震防线;结论支撑与半刚接钢框架协同工作使得试件具有较高的抗侧刚度抵抗水平变形,且承载力较高、滞回性能稳定、耗能能力优良;单边螺栓在试验过程中的受力性能较普通高强螺栓并无较大差别,未出现严重的预紧力松弛现象,并能高效的保持螺栓预紧力。通过有限元数值模拟分析可知,减小支撑长细比,虽能有效提高结构的抗震性能,但长细比较小会导致支撑刚度增大,加速其余构件的损坏。故应以考虑结构的延性为前提,降低支撑的长细比,才能有效提高结构的抗震性能。 展开更多
关键词 中心支撑 单边螺栓 T型钢 半刚性连接 抗震性能
下载PDF
一种航天器在轨环境下结构变形的反演方法
10
作者 孙维 王丁 +5 位作者 罗文波 阎军 田阔 赵文彦 任晗 张鹏 《航天器环境工程》 CSCD 2024年第3期290-295,共6页
为实现航天器在轨结构变形高效计算,提出一种基于神经网络的结构变形反演方法:借助有限元分析法获得结构在不同温度载荷作用下的变形分布特征,并利用获取的数据对输入和输出间神经网络进行训练,获取高精度的代理模型。利用该模型,可以... 为实现航天器在轨结构变形高效计算,提出一种基于神经网络的结构变形反演方法:借助有限元分析法获得结构在不同温度载荷作用下的变形分布特征,并利用获取的数据对输入和输出间神经网络进行训练,获取高精度的代理模型。利用该模型,可以在轨测量的温度作为输入,实现对航天器结构全场变形的快速反演;可通过引入合适参数的高斯噪声,增强神经网络对于输入误差的适应能力;可用改进的连接权值分析方法,给出确定传感器数量下,实现变形反演精度最高的结构温度测点的布局优化方案。综上,该反演方法具有精度高、实时性强、受输入误差影响小等优点,其应用对于提升遥感卫星的成像质量具有重要意义。 展开更多
关键词 航天器 结构变形 位移场反演 神经网络 代理模型
下载PDF
委托代持担保物权的法律效力
11
作者 高圣平 陈南成 《苏州大学学报(法学版)》 2024年第2期123-136,共14页
在特定的交易模式中,担保物权可由他人代为持有。为使金融交易方式更加灵活便捷,应缓和担保物权设立上的从属性,允许为将来债权提供担保,在担保物权可得实现之时,主债权真实存在即可。在权利归属认定中,法院不宜恪守于权利登记内容,在... 在特定的交易模式中,担保物权可由他人代为持有。为使金融交易方式更加灵活便捷,应缓和担保物权设立上的从属性,允许为将来债权提供担保,在担保物权可得实现之时,主债权真实存在即可。在权利归属认定中,法院不宜恪守于权利登记内容,在不影响第三人权益的前提下,应尊重当事人间的真实意思表示,认定债权人为实际权利人。倘若名义权利人将登记系统上所登记的债权及担保物权无权处分给第三人,善意取得规则自有适用空间。在担保物权可得实现之时,原则上债权人和受托人均可行使担保物权。在特殊情形下,担保物权的行使主体可由当事人约定。 展开更多
关键词 委托代持 从属性 登记公示 无权处分 准共有
下载PDF
内置工字型CFRP型材高强圆钢管高强混凝土轴压短柱组合效应分析
12
作者 李帼昌 西志远 李晓 《沈阳建筑大学学报(自然科学版)》 CAS 北大核心 2024年第1期1-9,共9页
目的 研究内置工字型CFRP型材的高强圆钢管高强混凝土短柱在轴心压力作用下三种材料的组合效应。方法 采用有限元分析软件ABAQUS对其进行数值模拟,通过相关试验验证模型的准确性,并对典型构件的破坏形态、受力全过程曲线进行分析,揭示... 目的 研究内置工字型CFRP型材的高强圆钢管高强混凝土短柱在轴心压力作用下三种材料的组合效应。方法 采用有限元分析软件ABAQUS对其进行数值模拟,通过相关试验验证模型的准确性,并对典型构件的破坏形态、受力全过程曲线进行分析,揭示构件各组成部分之间的相互作用和工作机理,评估CFRP配置率、钢材屈服强度、混凝土抗压强度、约束效应系数对组合效应的影响。结果 在高强圆钢管高强混凝土柱中内置CFRP型材,对构件的延性及安全裕度有显著提高,并改善了高强圆钢管对高强混凝土的约束,提高了构件的组合效应。结论 CFRP配置率控制在5.9%~8.4%,约束效应系数在1.2~1.4,钢材屈服强度不大于770 MPa时,构件中三种材料组合效应最佳。 展开更多
关键词 轴压短柱 高强圆钢管高强混凝土 CFRP型材 约束机理 组合效应
下载PDF
基于Proxy的网络计费系统的设计与实现 被引量:15
13
作者 易正强 王耀军 《计算机工程》 CAS CSCD 北大核心 2001年第2期166-168,共3页
讨论在校园网环境下的网络计费,对基于Proxy的网络计费与管理进行了详细设计,给出了巨量数据的处理方法。
关键词 校园网 网络计费系统 代理服务器 proxy INTERNE
下载PDF
一种基于Proxy的Web应用安全漏洞检测方法及实现 被引量:6
14
作者 王鹃 李俊娥 刘珺 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2005年第5期135-140,共6页
指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL... 指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL代码插入、跨站点脚本算法的JAVA语言实现. 展开更多
关键词 WEB应用安全 漏洞检测 proxy JAVA
下载PDF
陕南勉县寒武系仙女洞组生物礁岩相学及古环境分析 被引量:2
15
作者 李雅兰 李飞 +7 位作者 吕月健 王夏 王曾俊 李红 易楚恒 李杨凡 曾伟 李怡霖 《沉积学报》 CAS CSCD 北大核心 2024年第2期608-618,共11页
【目的】生物礁演化史上一个关键节点是寒武纪早期广泛出现了后生动物古杯与微生物群落的联合造礁,该造礁群落形成环境和发育条件值得探讨。【方法】以华南板块西北缘汉南—米仓山地区的勉县大河坝剖面为例,对寒武系仙女洞组沉积序列和... 【目的】生物礁演化史上一个关键节点是寒武纪早期广泛出现了后生动物古杯与微生物群落的联合造礁,该造礁群落形成环境和发育条件值得探讨。【方法】以华南板块西北缘汉南—米仓山地区的勉县大河坝剖面为例,对寒武系仙女洞组沉积序列和生物礁临近层位开展了系统的岩相学、沉积学和元素地球化学分析。【结果】岩相学特征显示礁体形成于海退背景下的临滨带环境,建造过程可依次分为钙质微生物主导、古杯动物大量繁盛以及古杯与钙质微生物联合建造三个阶段。生物礁灰岩中的陆源碎屑组分含量向上增多,且颗粒变粗,顶部被中—细砂岩覆盖。【结论】古杯—钙质微生物礁生长过程中对低强度的陆源碎屑输入具有一定的耐受度,当粗粒陆源碎屑组分的持续、高强度输入时将造成生物礁发育终止。本实例揭示了古杯—钙质微生物造礁群落生长过程与海底生态指标的相关性,可为古环境学、沉积学和储层地质学相关研究提供参考。 展开更多
关键词 古杯—钙质微生物群落 礁灰岩 古环境指标 寒武纪第三期 汉南—米仓山地区
下载PDF
基于MS Proxy Server的网络计费系统的实现 被引量:2
16
作者 邹刚 敖永红 +1 位作者 柯水洲 曹承倜 《计算机工程与应用》 CSCD 北大核心 2003年第6期151-154,共4页
文中介绍了代理服务器的计费方式,阐述了基于MSProxyServer的网络计费系统的设计与实现。
关键词 MS proxy Server 网络计费系统 计算机网络 网络管理 防火墙 代理服务器
下载PDF
全民所有自然资源资产所有权委托代理行使机制探讨 被引量:2
17
作者 李哲 吴爽 《中国国土资源经济》 2024年第3期43-51,57,共10页
全民所有自然资源资产所有权委托代理机制是自然资源资产所有权的一种行使方式,是落实自然资源资产全民所有的重要举措,也是社会主义公有制的实现方式。目前,对于全民所有自然资源资产所有权委托代理制度,法律并无明确规定,试点地区开... 全民所有自然资源资产所有权委托代理机制是自然资源资产所有权的一种行使方式,是落实自然资源资产全民所有的重要举措,也是社会主义公有制的实现方式。目前,对于全民所有自然资源资产所有权委托代理制度,法律并无明确规定,试点地区开始探索行之有效的委托代理履职模式。文章通过梳理试点地区的实践经验,发现全民所有自然资源资产所有权委托代理面临所有权行使的权责不明确、自然资源资产“家底”不清、委托代理制度不健全等困境。基于此,文章从优化权责分配关系、做好资产清查和统计工作、科学编制自然资源清单、完善委托代理制度等方面提出建议。 展开更多
关键词 全民所有 委托代理 所有者职责
下载PDF
基于策略DNS和HTTP Proxy的多宿主网络服务部署的研究 被引量:2
18
作者 王子荣 胡浩 +1 位作者 尹绍锋 王宇科 《计算机工程与科学》 CSCD 北大核心 2014年第2期238-243,共6页
针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DN... 针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DNS服务进行联合部署。从理论上对该策略进行了分析,并对部署方法进行了详细阐述。通过实例分析及效果测量,证实了在不改变网络拓扑、基本不增加投入的情况下,通过该策略可大幅度提高校园网或企业网信息资源服务的互联网用户访问速度和访问质量,并解决了传统方式中路由不可达的问题。 展开更多
关键词 策略 DNS HTTP proxy 多宿主网络
下载PDF
基于PROXY服务器的网络计费系统原理与实现 被引量:3
19
作者 谭跃生 王静宇 《内蒙古大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第2期221-223,共3页
网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、... 网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、数据查询等主要模块的设计作了较详细的阐述 . 展开更多
关键词 代理服务器 网络计费系统 日志文件 网络管理 代理机制 proxy服务器 校园网 工作原理
下载PDF
Transit-Stub网络拓扑可视化研究 被引量:3
20
作者 冀汶莉 李勇军 《微电子学与计算机》 CSCD 北大核心 2007年第1期136-139,共4页
随着网络规模的不断增加,网络仿真中所用到的Transit-Stub网络拓扑显示结构变的越来越复杂,使得用户很难理解和掌握。文章在分析Transit-Stub网络拓扑特性的基础上对其进行扩展,提出了一种新的分层可视化Transit-Stub网络拓扑显示方法,... 随着网络规模的不断增加,网络仿真中所用到的Transit-Stub网络拓扑显示结构变的越来越复杂,使得用户很难理解和掌握。文章在分析Transit-Stub网络拓扑特性的基础上对其进行扩展,提出了一种新的分层可视化Transit-Stub网络拓扑显示方法,并详细阐述了该方法的实现模型以及实现中的关键技术,这个方法有效的解决了大规模网络拓扑结构显示的高效性和直观性问题。 展开更多
关键词 网络拓扑 Transit—stub网络 可视化 分层显示
下载PDF
上一页 1 2 238 下一页 到第
使用帮助 返回顶部