期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
A机系统安全设计方案简介
1
作者 郭继军 《电脑与信息技术》 1998年第2期59-61,共3页
本文从数据库、磁盘文件系统、主机硬件系统三方面介绍了A机系统的安全设计方案。
关键词 银行业务 A机系统 安全设计方案
下载PDF
灾害与突发事件ICU大数据平台的安全设计 被引量:1
2
作者 罗福强 李瑶 范展源 《计算机技术与发展》 2016年第10期69-72,共4页
基于四川省"灾害与突发公共卫生事件重症救护大数据平台"建设项目展开研究。由于项目涉及到医疗机构、医生、病人等大量医疗信息的网络传输,对系统安全性的设计显得尤为重要。从系统、程序资源访问控制、功能性、数据域四个... 基于四川省"灾害与突发公共卫生事件重症救护大数据平台"建设项目展开研究。由于项目涉及到医疗机构、医生、病人等大量医疗信息的网络传输,对系统安全性的设计显得尤为重要。从系统、程序资源访问控制、功能性、数据域四个层次分析了现有的安全模型,找出了其中的限制与不足之处。根据现有的安全隐患,设计了新的基于云计算架构的应用系统的安全模型。该模型以成熟的虚拟化技术为基础,以追求高可用性、可伸缩性、安全性为目标,具有三重安全保障机制。以此模型提出项目的安全解决方案,确保项目的顺利实施。通过项目的运行检测,结果表明该安全设计方案可以保障平台信息不会轻易泄漏,从而保护用户的权益。 展开更多
关键词 突发公共卫生事件 重症救治 大数据 安全模型 云计算架构 安全设计方案
下载PDF
浅析IPv6改造与加固网络安全的设计与实现 被引量:4
3
作者 薄辉 张小杰 《网络安全和信息化》 2022年第6期112-115,共4页
为响应国家关于加快推进IPv6规模部署和应用工作要求,满足相关网络安全等级保护要求,解析了IPv6改造与加固的实现目标及挑战、具体措施、相关网络安全设计方案、以及IPv4/IPv6设计方案。
关键词 网络安全 IPV6 安全设计方案 规模部署 加快推进 加固 实现目标 设计与实现
下载PDF
对广电内容分发网络安全管理的设计与研究
4
作者 王鹏 丁璐 《广播电视网络》 2020年第3期62-63,共2页
本文结合河北广电内容分发网络工程实践,介绍了一种广电内容分发网络CDN安全管理设计方案,并对方案内容进行了研究与分析。
关键词 广电网络 安全管理设计方案 CDN
下载PDF
119接处警系统信息安全设计与实现
5
作者 司伟 王飞 《网络安全技术与应用》 2008年第6期59-61,共3页
119接处警系统的信息安全是系统正常运行的关键。本文针对北京市119接处警系统面临的安全风险和安全需求,从计算机系统、数据传输链路、数据库及网络等各个环节提出了完善、统一的安全设计方案。
关键词 信息安全 安全风险 数据传输链路 安全设计方案
原文传递
IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2
6
作者 Xie Qi Wang Jilin Yu Xiuyuan 《Journal of Electronics(China)》 2007年第6期806-811,共6页
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv... In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. 展开更多
关键词 Digital signature Proxy signature Threshold proxy signature Threshold multi-proxy threshold multi-signature Threshold verification
下载PDF
Design and Occupant-Protection Performance Analysis of a New Tubular Driver Airbag 被引量:1
7
作者 Huajian Zhou Zhihua Zhong Manjiang Hu 《Engineering》 2018年第2期127-133,共7页
An airbag is an effective protective device for vehicle occupant safety, but may cause unexpected injury from the excessive energy of ignition when it is deployed, This paper focuses on the design of a new tubular dri... An airbag is an effective protective device for vehicle occupant safety, but may cause unexpected injury from the excessive energy of ignition when it is deployed, This paper focuses on the design of a new tubular driver airhag from the perspective of reducing the dosage of gas generant, Three different dummies were selected for computer simulation to investigate the stiffness and protection performance of the new airhag, Next, a multi-objective optimization of the 50th percentile dummy was conducted, The results show that the static volume of the new airhag is only about 113 of the volume of an ordinary one, and the injury value of each type of dummy can meet legal requirements while reducing the gas dosage by at least 30%, The combined injury index (Pcomb) decreases by 22% and the gas dosage is reduced by 32% after optimization, This study demonstrates that the new tubular driver airbag has great potential for protection in terms of reducing the gas dosage, 展开更多
关键词 New tubular airbag Occupant protection Multi-objective optimization
下载PDF
Dynamic Design and Construction of Highway Cut Slopes in Huangshan Area, China
8
作者 JU Nengpan ZHAO Jianjun +1 位作者 HUANG Runqiu DUAN Haipeng 《Journal of Mountain Science》 SCIE CSCD 2011年第2期154-165,共12页
Deformation and failure of high slope impact the construction and operation safety of highway in the mountainous areas. The deformation and failure are mainly caused by poor design which normally has not well combined... Deformation and failure of high slope impact the construction and operation safety of highway in the mountainous areas. The deformation and failure are mainly caused by poor design which normally has not well combined with the geological conditions and unplanned construction. Therefore, effective design and construction management should be conducted for ensuring a successful construction without damage and risk. In light of the reality of high slope construction along highway in the Huangshan area, this paper proposes a technical procedure for dynamic design and construction management of high slopes along highway in the mountainous area. The proposed construction management scheme is divided into three phases, i.e., 1) design phase, 2) preparation phase of excavation, and 3) construction phase. During the design phase, experiences and lessons learnt from the design and construction of other high slopes along highway in the same region are summarized. The number of slopes and slope height should be optimized from the aspects of route selection and route form. During the preparation phase of excavation, "Excavation Permit Management System" should be adopted, and construction scheme should be made by the construction unit, then the scientific research and design unit determine whether it guarantees slope stability and makes optimization measures. During the construction phase, the scientific research unit would make proposal of optimization design, and apply the achievements of scientific research into practice through common efforts of various units based on the understanding of excavation and investigation. The management system mentioned above is adopted to conduct dynamic design and construction management for more than 90 slopes along the Huangshan - Taling - Taolin Expressway, and successful results of application have been achieved. 展开更多
关键词 Highway cut slopes Dynamic design and construction Excavation Permit Management System Slope stability
下载PDF
Design and Implementation of Security Solution for Computer Network
9
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 Network security FIREWALL Intrusion detection Security audit
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部