上海船厂造机车间是我国20世纪70年代初国家标准化设计的大型单层工业厂房,为装配式钢筋混凝土横向排架结构。改建设计要求在原厂房南北高低跨柱身牛腿上进行托架换梁→托架置梁,因旧托架的拆除将使其上部屋盖系统荷载改变传递路径,所以...上海船厂造机车间是我国20世纪70年代初国家标准化设计的大型单层工业厂房,为装配式钢筋混凝土横向排架结构。改建设计要求在原厂房南北高低跨柱身牛腿上进行托架换梁→托架置梁,因旧托架的拆除将使其上部屋盖系统荷载改变传递路径,所以,如何降低置换结构在荷载转换过程中的安全风险,遂成为项目施工的技术关键。项目体通过精细化管理以及施工方案的优化,同时辅以国内建筑领域先进的"结构安全预警"监控技术(Structural Health Monitoring,简称SHM),使置换工程一次成功,不仅为企业取得了良好的社会和经济效益,亦为今后类似"旧厂房改建"的开发利用提供了可以借鉴的经验。展开更多
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou...The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.展开更多
The primary contradiction facing China's agricultural development has shifted from the previous undersupply to structural contradictions. This paper dissects these structural contradictions in terms of sectoral st...The primary contradiction facing China's agricultural development has shifted from the previous undersupply to structural contradictions. This paper dissects these structural contradictions in terms of sectoral structure, product structure, organizational structure, technical structure, trade structure and spatial structure. Since reform and opening-up in 1978, China has followed a growth-oriented agricultural policy to ensure steady yield increase. Indeed, this policy has effectively increased the output of agricultural produce, safeguarded national food security, and enhanced agricultural production capabilities. However, China's agriculture is yet to become internationally competitive, increase efficiency and farmers' income, and improve the quality and safety of agricultural produce. As China's agricultural development enters into a new stage of comprehensive transition and upgrade, it is essential for China's agricultural policy to shift from the progrowth policy characterized by the dependence on chemical fertilizers and pesticides to an efficiency and quality-oriented policy that pursues green agriculture.展开更多
Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and t...Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and the node clone, proposed a ZigBee routing protocol for the MAC layer security comprehensive detection algorithm. Fuzzing test show that the testing algorithm can not only greatly improve the test efficiency in Fuzzing, more than the structure of Fuzzing is increased by 50% in path coverage.展开更多
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ...There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.展开更多
Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the busine...Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the business world. Pay as per the usage kind of cost structure coupled with delivery of computing services through internet makes cloud computing an exciting and potential growth oriented information technology model compared with conventional computing services delivery models. Various additional features like scalability, flexibility and easy deployment process creates a window for the organizations even relatively smaller in size to get benefitted by the highly advanced & modern technologies without incurring substantial cost. In spite of so many benefits of this new delivery model, concerns are beginning to grow about how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Other related concerns associated with the adoption of cloud computing include trust on service providers, loss of control and compliance issues. This paper is an attempt to explore security & trust issues linked with cloud computing adoption in the Small and Medium Enterprises (SME) sector.展开更多
文摘上海船厂造机车间是我国20世纪70年代初国家标准化设计的大型单层工业厂房,为装配式钢筋混凝土横向排架结构。改建设计要求在原厂房南北高低跨柱身牛腿上进行托架换梁→托架置梁,因旧托架的拆除将使其上部屋盖系统荷载改变传递路径,所以,如何降低置换结构在荷载转换过程中的安全风险,遂成为项目施工的技术关键。项目体通过精细化管理以及施工方案的优化,同时辅以国内建筑领域先进的"结构安全预警"监控技术(Structural Health Monitoring,简称SHM),使置换工程一次成功,不仅为企业取得了良好的社会和经济效益,亦为今后类似"旧厂房改建"的开发利用提供了可以借鉴的经验。
基金supported in part by the following grants:National Science Foundation of China(Grant No.61272400)Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)+3 种基金Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Foundation of CQUPT(Grant No.WF201403)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.
文摘The primary contradiction facing China's agricultural development has shifted from the previous undersupply to structural contradictions. This paper dissects these structural contradictions in terms of sectoral structure, product structure, organizational structure, technical structure, trade structure and spatial structure. Since reform and opening-up in 1978, China has followed a growth-oriented agricultural policy to ensure steady yield increase. Indeed, this policy has effectively increased the output of agricultural produce, safeguarded national food security, and enhanced agricultural production capabilities. However, China's agriculture is yet to become internationally competitive, increase efficiency and farmers' income, and improve the quality and safety of agricultural produce. As China's agricultural development enters into a new stage of comprehensive transition and upgrade, it is essential for China's agricultural policy to shift from the progrowth policy characterized by the dependence on chemical fertilizers and pesticides to an efficiency and quality-oriented policy that pursues green agriculture.
文摘Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and the node clone, proposed a ZigBee routing protocol for the MAC layer security comprehensive detection algorithm. Fuzzing test show that the testing algorithm can not only greatly improve the test efficiency in Fuzzing, more than the structure of Fuzzing is increased by 50% in path coverage.
文摘There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
文摘Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the business world. Pay as per the usage kind of cost structure coupled with delivery of computing services through internet makes cloud computing an exciting and potential growth oriented information technology model compared with conventional computing services delivery models. Various additional features like scalability, flexibility and easy deployment process creates a window for the organizations even relatively smaller in size to get benefitted by the highly advanced & modern technologies without incurring substantial cost. In spite of so many benefits of this new delivery model, concerns are beginning to grow about how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Other related concerns associated with the adoption of cloud computing include trust on service providers, loss of control and compliance issues. This paper is an attempt to explore security & trust issues linked with cloud computing adoption in the Small and Medium Enterprises (SME) sector.