期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
念好“四字经” 筑牢“安全墙”
1
作者 冯启彬 《教书育人(校长参考)》 2021年第11期11-12,共2页
安全工作是学校工作的重中之重,责任重于泰山。学校要从"全、细、严、实"着手,不断健全安全制度规范,强化各项管理措施,完善安全防控体系,扎实推进学校安全工作。
关键词 安全稳定 “四字经” “安全墙”
下载PDF
Optimal configuration of firewall, IDS and vulnerability scan by game theory 被引量:7
2
作者 赵柳榕 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2011年第2期144-147,共4页
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash... The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail. 展开更多
关键词 economics of information systems FIREWALL intrusion detection system (IDS) vulnerability scan securityportfolio strategy
下载PDF
STUDY ON SEAMLESS AND MULTILEVEL VPN
3
作者 陈兵 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2002年第2期182-186,共5页
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ... The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control. 展开更多
关键词 network security virtual private network FIREWALLS
下载PDF
Seismic stability of reinforced soil walls under bearing capacity failure by pseudo-dynamic method 被引量:6
4
作者 阮晓波 孙树林 《Journal of Central South University》 SCIE EI CAS 2013年第9期2593-2598,共6页
In order to evaluate the seismic stability of reinforced soil walls against bearing capacity failure,the seismic safety factor of reinforced soil walls was determined by using pseudo-dynamic method,and calculated by c... In order to evaluate the seismic stability of reinforced soil walls against bearing capacity failure,the seismic safety factor of reinforced soil walls was determined by using pseudo-dynamic method,and calculated by considering different parameters,such as horizontal and vertical seismic acceleration coefficients,ratio of reinforcement length to wall height,back fill friction angle,foundation soil friction angle,soil reinforcement interface friction angle and surcharge.The parametric study shows that the seismic safety factor increases by 24-fold when the foundation soil friction angle varies from 25°to 45°,and increases by 2-fold when the soil reinforcement interface friction angle varies from 0 to 30°.That is to say,the bigger values the foundation soil and/or soil reinforcement interface friction angles have,the safer the reinforced soil walls become in the seismic design.The results were also compared with those obtained from pseudo-static method.It is found that there is a higher value of the safety factor by the present work. 展开更多
关键词 reinforced soil walls seismic stability against bearing capacity seismic active force pseudo-dynamic method
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
5
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
Study on Network Security Architecture for Power Systems 被引量:2
6
作者 Chen Yan Li Zengzhi Liao Zhigang 《Electricity》 2005年第3期47-49,共3页
The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which ... The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality. 展开更多
关键词 network security power system IDS FIREWALL
下载PDF
Personalized Trust Management for Open and Flat P2P Communities
7
作者 左敏 李建华 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期527-532,共6页
A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trus... A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload. 展开更多
关键词 P2P trust management DHT collaborative filtering
下载PDF
Pseudo-dynamic analysis of overturning stability of retaining wall 被引量:4
8
作者 王奎华 马少俊 吴文兵 《Journal of Central South University》 SCIE EI CAS 2011年第6期2085-2090,共6页
A new method was presented to determine the safety factor of wall stability against overturning based on pseudo-dynamic approach. In this time-dependent method, the actual dynamic effect with variation of time and pro... A new method was presented to determine the safety factor of wall stability against overturning based on pseudo-dynamic approach. In this time-dependent method, the actual dynamic effect with variation of time and propagation of shear and primary wave velocities through the backfills was considered. Planar failure surface was considered behind the retaining wall. The results were compared with those obtained from Mononobe-Okabe theory. It is found that there is a higher value of safety factor by the present dynamic analysis. The effects of wall inclination, wall friction angle, soil friction angle and horizontal and vertical seismic coefficients on the overturning stability of retaining wall were investigated. The parametric study shows that both horizontal and vertical seismic accelerations have decreasing effect on the overturning stability of retaining wall. 展开更多
关键词 seismic active force pseudo-dynamic method EARTHQUAKE stability against overturning retaining wall
下载PDF
Study on the law of methane seepage in the wall of drainage roadway in mining seam-group
9
作者 刘健 罗勇 +1 位作者 刘泽功 石必明 《Journal of Coal Science & Engineering(China)》 2005年第2期64-66,共3页
Based on the equation of the gas flow continuity and state, Darcy law and Langmuir equation, the law of methane seepage in the wall of drainage roadway was studied. The governing equation of methane one-way seepage in... Based on the equation of the gas flow continuity and state, Darcy law and Langmuir equation, the law of methane seepage in the wall of drainage roadway was studied. The governing equation of methane one-way seepage in the seam was founded. By solving the equation, the calculation of methane seepage velocity in the coal wall was worked out. The result has really applied worth and will give beneficial references to re-lated research, it provides preventing coal and gas outbursts with theoretical gist. 展开更多
关键词 drainage roadway methane seepage governing equation methane drainage
下载PDF
Research on Network Architecture and Security in Small and Medium Sized Enterprises
10
作者 Yanmei Zhang 《International Journal of Technology Management》 2014年第8期98-100,共3页
The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which in... The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security. 展开更多
关键词 Small and medium-sized enterprises network security security system layered protection
下载PDF
Design Method of Rigid Blast Wall Under the Explosion of Vehicular Bomb
11
作者 WANG Qizhen WU Hao 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第1期143-154,共12页
Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The exp... Blast wall can prevent vehicles from approaching the protective building and can reduce the destructive power of shock wave to a certain extent.However,majority of studies on blast walls have some shortcomings.The explosion test data are few.Most exsiting studies focus on the propagation of shock wave and the influence of blast wall on the propagation of shock wave.Discussion on the main parameters of blast wall design is meagre,such as the design of safety distance,the distance from the blast wall to the protective building,height and width of the blast wall.This paper uses the finite element programme LS-DYNA to design the blast wall.To analyze the convergence of the finite element model and to determine the mesh size of the model,this paper establishes several finite element models with different sizes of meshes to verify the model.Then,the overpressure distribution of the shock wave on the protective building is simulated to implement the blast wall design.The geometric parameters of the blast wall are preliminarily determined.And the influence of the safety distance on the overpressure of the building surface is mainly discussed,so as to determine the final design parameters.When the overpressure is less than 2 kPa,it is considered that there will be no damage to people caused by flying fragments.Eventually,the blast wall height is 3 m,the thickness is 1 m,and the safety distance is 35 m.The proposed method is used to demonstrate the design method,and the final design parameters of the blast wall can thus be used for reference. 展开更多
关键词 blast wall vehicular bomb shock wave safety distance numerical simulation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部