The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ...The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control.展开更多
In order to evaluate the seismic stability of reinforced soil walls against bearing capacity failure,the seismic safety factor of reinforced soil walls was determined by using pseudo-dynamic method,and calculated by c...In order to evaluate the seismic stability of reinforced soil walls against bearing capacity failure,the seismic safety factor of reinforced soil walls was determined by using pseudo-dynamic method,and calculated by considering different parameters,such as horizontal and vertical seismic acceleration coefficients,ratio of reinforcement length to wall height,back fill friction angle,foundation soil friction angle,soil reinforcement interface friction angle and surcharge.The parametric study shows that the seismic safety factor increases by 24-fold when the foundation soil friction angle varies from 25°to 45°,and increases by 2-fold when the soil reinforcement interface friction angle varies from 0 to 30°.That is to say,the bigger values the foundation soil and/or soil reinforcement interface friction angles have,the safer the reinforced soil walls become in the seismic design.The results were also compared with those obtained from pseudo-static method.It is found that there is a higher value of the safety factor by the present work.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which ...The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.展开更多
A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trus...A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload.展开更多
A new method was presented to determine the safety factor of wall stability against overturning based on pseudo-dynamic approach. In this time-dependent method, the actual dynamic effect with variation of time and pro...A new method was presented to determine the safety factor of wall stability against overturning based on pseudo-dynamic approach. In this time-dependent method, the actual dynamic effect with variation of time and propagation of shear and primary wave velocities through the backfills was considered. Planar failure surface was considered behind the retaining wall. The results were compared with those obtained from Mononobe-Okabe theory. It is found that there is a higher value of safety factor by the present dynamic analysis. The effects of wall inclination, wall friction angle, soil friction angle and horizontal and vertical seismic coefficients on the overturning stability of retaining wall were investigated. The parametric study shows that both horizontal and vertical seismic accelerations have decreasing effect on the overturning stability of retaining wall.展开更多
Based on the equation of the gas flow continuity and state, Darcy law and Langmuir equation, the law of methane seepage in the wall of drainage roadway was studied. The governing equation of methane one-way seepage in...Based on the equation of the gas flow continuity and state, Darcy law and Langmuir equation, the law of methane seepage in the wall of drainage roadway was studied. The governing equation of methane one-way seepage in the seam was founded. By solving the equation, the calculation of methane seepage velocity in the coal wall was worked out. The result has really applied worth and will give beneficial references to re-lated research, it provides preventing coal and gas outbursts with theoretical gist.展开更多
The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which in...The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.展开更多
Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The exp...Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The explosion test data are few.Most exsiting studies focus on the propagation of shock wave and the influence of blast wall on the propagation of shock wave.Discussion on the main parameters of blast wall design is meagre,such as the design of safety distance,the distance from the blast wall to the protective building,height and width of the blast wall.This paper uses the finite element programme LS-DYNA to design the blast wall.To analyze the convergence of the finite element model and to determine the mesh size of the model,this paper establishes several finite element models with different sizes of meshes to verify the model.Then,the overpressure distribution of the shock wave on the protective building is simulated to implement the blast wall design.The geometric parameters of the blast wall are preliminarily determined.And the influence of the safety distance on the overpressure of the building surface is mainly discussed,so as to determine the final design parameters.When the overpressure is less than 2 kPa,it is considered that there will be no damage to people caused by flying fragments.Eventually,the blast wall height is 3 m,the thickness is 1 m,and the safety distance is 35 m.The proposed method is used to demonstrate the design method,and the final design parameters of the blast wall can thus be used for reference.展开更多
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.
文摘The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control.
文摘In order to evaluate the seismic stability of reinforced soil walls against bearing capacity failure,the seismic safety factor of reinforced soil walls was determined by using pseudo-dynamic method,and calculated by considering different parameters,such as horizontal and vertical seismic acceleration coefficients,ratio of reinforcement length to wall height,back fill friction angle,foundation soil friction angle,soil reinforcement interface friction angle and surcharge.The parametric study shows that the seismic safety factor increases by 24-fold when the foundation soil friction angle varies from 25°to 45°,and increases by 2-fold when the soil reinforcement interface friction angle varies from 0 to 30°.That is to say,the bigger values the foundation soil and/or soil reinforcement interface friction angles have,the safer the reinforced soil walls become in the seismic design.The results were also compared with those obtained from pseudo-static method.It is found that there is a higher value of the safety factor by the present work.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
文摘The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.
基金Supported by the National High-Tech Research and Development Plan of China (863) (No.2003AA142160)
文摘A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload.
基金Project(50879077) supported by the National Natural Science Foundation of China
文摘A new method was presented to determine the safety factor of wall stability against overturning based on pseudo-dynamic approach. In this time-dependent method, the actual dynamic effect with variation of time and propagation of shear and primary wave velocities through the backfills was considered. Planar failure surface was considered behind the retaining wall. The results were compared with those obtained from Mononobe-Okabe theory. It is found that there is a higher value of safety factor by the present dynamic analysis. The effects of wall inclination, wall friction angle, soil friction angle and horizontal and vertical seismic coefficients on the overturning stability of retaining wall were investigated. The parametric study shows that both horizontal and vertical seismic accelerations have decreasing effect on the overturning stability of retaining wall.
文摘Based on the equation of the gas flow continuity and state, Darcy law and Langmuir equation, the law of methane seepage in the wall of drainage roadway was studied. The governing equation of methane one-way seepage in the seam was founded. By solving the equation, the calculation of methane seepage velocity in the coal wall was worked out. The result has really applied worth and will give beneficial references to re-lated research, it provides preventing coal and gas outbursts with theoretical gist.
文摘The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security.
基金This work was supported by the National Natural Science Foundation of China(No.51878507).
文摘Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The explosion test data are few.Most exsiting studies focus on the propagation of shock wave and the influence of blast wall on the propagation of shock wave.Discussion on the main parameters of blast wall design is meagre,such as the design of safety distance,the distance from the blast wall to the protective building,height and width of the blast wall.This paper uses the finite element programme LS-DYNA to design the blast wall.To analyze the convergence of the finite element model and to determine the mesh size of the model,this paper establishes several finite element models with different sizes of meshes to verify the model.Then,the overpressure distribution of the shock wave on the protective building is simulated to implement the blast wall design.The geometric parameters of the blast wall are preliminarily determined.And the influence of the safety distance on the overpressure of the building surface is mainly discussed,so as to determine the final design parameters.When the overpressure is less than 2 kPa,it is considered that there will be no damage to people caused by flying fragments.Eventually,the blast wall height is 3 m,the thickness is 1 m,and the safety distance is 35 m.The proposed method is used to demonstrate the design method,and the final design parameters of the blast wall can thus be used for reference.