期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
分析传感器网与计算机网融合的安全技术研究
1
作者 段秀红 《计算机光盘软件与应用》 2012年第17期152-152,157,共2页
未来信息网络发展主要包括:移动化、多样化、小型化的无线传感器网以及扁平化、综合化、大型化的计算机网两个方向,而在异构网络融合中,两网融合的网络模式非常的典型。本文主要针对安全问题,对异构融合网络的安全技术进行了分析和探究... 未来信息网络发展主要包括:移动化、多样化、小型化的无线传感器网以及扁平化、综合化、大型化的计算机网两个方向,而在异构网络融合中,两网融合的网络模式非常的典型。本文主要针对安全问题,对异构融合网络的安全技术进行了分析和探究,以促使传感器网与计算机网融合的安全与发展。 展开更多
关键词 安全技术环境 安全技术结构 异构网络安全威胁
下载PDF
传感器网与计算机网融合的安全技术研究
2
作者 杜飞 徐启建 蔡志伟 《无线电工程》 2010年第10期1-3,10,共4页
大型化、综合化、扁平化的计算机网和小型化、多样化、移动化的无线传感器网(WSN)代表未来信息网络发展的两大主流方向,两网的融合是异构网络融合的典型模式,面临一系列新的安全问题。从异构融合网络的安全问题出发,概要介绍了异构融合... 大型化、综合化、扁平化的计算机网和小型化、多样化、移动化的无线传感器网(WSN)代表未来信息网络发展的两大主流方向,两网的融合是异构网络融合的典型模式,面临一系列新的安全问题。从异构融合网络的安全问题出发,概要介绍了异构融合网络的安全需求及可能面临的威胁,提出了一套涵盖计算机端、虚网络和传感器网络端的全方位安全技术,并针对每一端进行了的分析和介绍。 展开更多
关键词 异构网络安全威胁 安全技术结构 安全技术环境 WSNSec
下载PDF
大型工业厂房建筑改造中的高低跨托架置梁施工关键技术的研究
3
作者 周华林 朱海定 +7 位作者 朱晓栋 周伟 李红梅 王浩 朱杰 王连青 李正媛 许文华 《建筑施工》 2015年第12期1401-1405,共5页
上海船厂造机车间是我国20世纪70年代初国家标准化设计的大型单层工业厂房,为装配式钢筋混凝土横向排架结构。改建设计要求在原厂房南北高低跨柱身牛腿上进行托架换梁→托架置梁,因旧托架的拆除将使其上部屋盖系统荷载改变传递路径,所以... 上海船厂造机车间是我国20世纪70年代初国家标准化设计的大型单层工业厂房,为装配式钢筋混凝土横向排架结构。改建设计要求在原厂房南北高低跨柱身牛腿上进行托架换梁→托架置梁,因旧托架的拆除将使其上部屋盖系统荷载改变传递路径,所以,如何降低置换结构在荷载转换过程中的安全风险,遂成为项目施工的技术关键。项目体通过精细化管理以及施工方案的优化,同时辅以国内建筑领域先进的"结构安全预警"监控技术(Structural Health Monitoring,简称SHM),使置换工程一次成功,不仅为企业取得了良好的社会和经济效益,亦为今后类似"旧厂房改建"的开发利用提供了可以借鉴的经验。 展开更多
关键词 旧建筑改建 保护性拆除 托架置梁 镶嵌吊装 结构安全预警监控技术
下载PDF
浅谈无线局域网技术
4
作者 王新利 《中国科技财富》 2010年第22期8-8,共1页
无线局域网是计算机网络与无线通信技术相结合的产物,它具有快捷高效、组网灵活等特点。无线局域网利用无线多址信道的一种有效方法来支持计算机之间的通信,并为通信的移动化、个性化和多媒体应用提供了可能。无线局域网是比较常用的,... 无线局域网是计算机网络与无线通信技术相结合的产物,它具有快捷高效、组网灵活等特点。无线局域网利用无线多址信道的一种有效方法来支持计算机之间的通信,并为通信的移动化、个性化和多媒体应用提供了可能。无线局域网是比较常用的,本文论述了无线局域网技术特点、网络结构以及网络安全做了相应的阐述。 展开更多
关键词 无线局域网技术特点网络结构网络安全
下载PDF
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
5
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
China's Agricultural Development: Structural Contradictions and Policy Transition
6
作者 Wei Houkai 《China Economist》 2018年第3期66-77,共12页
The primary contradiction facing China's agricultural development has shifted from the previous undersupply to structural contradictions. This paper dissects these structural contradictions in terms of sectoral st... The primary contradiction facing China's agricultural development has shifted from the previous undersupply to structural contradictions. This paper dissects these structural contradictions in terms of sectoral structure, product structure, organizational structure, technical structure, trade structure and spatial structure. Since reform and opening-up in 1978, China has followed a growth-oriented agricultural policy to ensure steady yield increase. Indeed, this policy has effectively increased the output of agricultural produce, safeguarded national food security, and enhanced agricultural production capabilities. However, China's agriculture is yet to become internationally competitive, increase efficiency and farmers' income, and improve the quality and safety of agricultural produce. As China's agricultural development enters into a new stage of comprehensive transition and upgrade, it is essential for China's agricultural policy to shift from the progrowth policy characterized by the dependence on chemical fertilizers and pesticides to an efficiency and quality-oriented policy that pursues green agriculture. 展开更多
关键词 agricultural development structural contradictions agricultural policy comprehensive transition and upgrade
下载PDF
三维位置定义(3D-LD)管理系统的元数据
7
作者 吴占君 郑重 王晓琳 《中国科技财富》 2010年第22期9-9,4,共2页
本文分析了三位位置定义系统的特点,重点介绍了三位位置定义中的元数据,作为描述数据的数据,元数据在三位位置定义系统中有着举足轻重的地位。本文通过两方面即空间元数据标准和非空间元数据标准对三维位置定义系统的元数据进行了详细... 本文分析了三位位置定义系统的特点,重点介绍了三位位置定义中的元数据,作为描述数据的数据,元数据在三位位置定义系统中有着举足轻重的地位。本文通过两方面即空间元数据标准和非空间元数据标准对三维位置定义系统的元数据进行了详细的描述。 展开更多
关键词 无线局域网技术特点网络结构网络安全
下载PDF
Research on Network Security Algorithm based on ZigBee Technology
8
作者 XiaoleiWu 《International Journal of Technology Management》 2014年第8期164-166,共3页
Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and t... Paper study the MAC layer security mechanism and data frame structure in ZigBee protocol, improve the algorithm for random Fuzzing test technology, and test method of attack fusion boundary, structure of Fuzzing and the node clone, proposed a ZigBee routing protocol for the MAC layer security comprehensive detection algorithm. Fuzzing test show that the testing algorithm can not only greatly improve the test efficiency in Fuzzing, more than the structure of Fuzzing is increased by 50% in path coverage. 展开更多
关键词 ZigBee protocol Fuzzing test boundary scan test
下载PDF
Personal Delegation by Persona Creation
9
作者 Coimbatore S. Chandersekaran William R. Simpson 《Computer Technology and Application》 2011年第6期413-423,共11页
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ... There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required. 展开更多
关键词 DELEGATION enterprise information security least privilege ATTRIBUTION information sharing
下载PDF
新书架
10
《家电科技(维修与培训)》 2004年第10期60-60,共1页
关键词 《音响调音快易通——问答篇》 调音师 书评 家用音响设备 操作技巧 《电梯安全技术——结构.标准.故障排除.事故分析》
下载PDF
Stumbling Blocks in Cloud Computing Adoption Pathway: A Charter
11
作者 Devesh Kumar Harsh Vardhan Samalia +1 位作者 Piyush Verma Hergovind Singh 《Computer Technology and Application》 2013年第12期635-642,共8页
Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the busine... Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the business world. Pay as per the usage kind of cost structure coupled with delivery of computing services through internet makes cloud computing an exciting and potential growth oriented information technology model compared with conventional computing services delivery models. Various additional features like scalability, flexibility and easy deployment process creates a window for the organizations even relatively smaller in size to get benefitted by the highly advanced & modern technologies without incurring substantial cost. In spite of so many benefits of this new delivery model, concerns are beginning to grow about how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Other related concerns associated with the adoption of cloud computing include trust on service providers, loss of control and compliance issues. This paper is an attempt to explore security & trust issues linked with cloud computing adoption in the Small and Medium Enterprises (SME) sector. 展开更多
关键词 Cloud computing PRIVACY security and SME.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部