期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于网络方式的计算机基础教学模式 被引量:1
1
作者 李阳 《计算机时代》 2007年第8期23-24,共2页
文章以某些基础课程为讨论对象,结合实践经验,从网络发展趋势、社会背景、技术潮流和网络化教学模式等方面论述了如何根据最新的技术和工程化的特点,改革计算机基础教学模式。
关键词 安全 rekey 信任域 SSH
下载PDF
Design and Implementation of Not So Cooperative Caching System 被引量:1
2
作者 HU Xiaoyan GONG Jian +2 位作者 CHENG Guang ZHANG Weiwei Ahmad Jakalan 《China Communications》 SCIE CSCD 2015年第7期31-46,共16页
Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighbori... Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighboring caches. These nodes would cooperate in caching and share cached content if and only if they each benefit. The challenges are to determine what objects to cache at each node and to implement the system in the context of Information Centric Networking(ICN). This work includes both a solution for the NSCC problem and a design and implementation of an NSCC system in Named Data Networking(NDN), a large effort that exemplifies ICN. Our design applies NDN synchronization protocol to facilitate the information exchange among nodes, adopts group key encryption to control data access within the NSCC group, and offers an error checker to detect error events in the system. Our approach is validated by deploying the system we developed on Planet Lab. 展开更多
关键词 named data networking content caching selfish caches SYNCHRONIZATION group rekeying error checker game theory
下载PDF
An efficient scalable key management scheme for secure group communication
3
作者 张骏 谷大武 +1 位作者 马范援 白英彩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期607-612,共6页
Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle ... Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle muhicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of muhicast messages transmitted upon a membership update is proportional to the depth of the tree, which is logarithmic to the size of the secure muhicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme---link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced. 展开更多
关键词 group security key management rekey
下载PDF
A Research on Improvement of Hadoop Security Mechanism
4
《International English Education Research》 2013年第12期90-92,共3页
. Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first ... . Hadoop, as an open-source cloud computing framework, is increasingly applied in many fields, while the weakness of security mechanism now becomes one of the main problems hindering its development. This paper first analyzes the current security mechanisms of Hadoop, then through study of Hadoop's security mechanism and analysis of security risk in its current ~,ersion, proposes a corresponding solution based on secure multicast to resovle the security risks. All these could provide certain technical supports for the enterprises in their Hadoop applications with new security needs. 展开更多
关键词 HADOOP security mechanism HDFS MapReduce Secure multicast rekeyING
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部