期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
学校信息技术网络建设与资源管理
1
作者 魏学锦 《现代教育科学(小学校长)》 2008年第4期106-107,共2页
目前,信息技术逐步成为生产力的重要组成部分,但小学信息技术的发展还处于初级阶段,为使学校在信息技术方面赶上时代的步伐,应在网络建设、制度化管理、网络安全管理、信息资源管理等几方面进行探究,充分发挥校园网络的作用,提高... 目前,信息技术逐步成为生产力的重要组成部分,但小学信息技术的发展还处于初级阶段,为使学校在信息技术方面赶上时代的步伐,应在网络建设、制度化管理、网络安全管理、信息资源管理等几方面进行探究,充分发挥校园网络的作用,提高校园网络的功能与效益。 展开更多
关键词 信息技术 网络建设 网络安管理 资源管理 制度化管理
下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
2
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
3
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
Research and improvement on packet capture mechanism in linux for high-speed network 被引量:2
4
作者 杨武 方滨兴 +1 位作者 云晓春 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期494-498,共5页
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu... With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network. 展开更多
关键词 high-speed network packet capture TCP/IP protocol stack performance bottleneck LKM
下载PDF
Optimal bandwidth scheduling of networked control systems (NCSs) in accordance with jitter 被引量:3
5
作者 白涛 吴智铭 杨根科 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期535-542,共8页
Network-induced delay and jitter are key factors causing performance degradation and instability of NCSs (networked control systems). The relationships between the sampling periods of the control loops, network-induce... Network-induced delay and jitter are key factors causing performance degradation and instability of NCSs (networked control systems). The relationships between the sampling periods of the control loops, network-induced delay and jitter were studied aimed at token-type networks. A jitter-dependent optimal bandwidth scheduling algorithm for NCSs is proposed, which tries to achieve a tradeoff between bandwidth occupancy and system performance. Simulation tests proved the effectiveness of this optimal scheduling algorithm. 展开更多
关键词 NCSs (networked control systems) Network-induced delay JITTER DEADLINE Loop delay
下载PDF
EKAES:AN EFFICIENT KEY AGREEMENT AND ENCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
6
作者 Cheng Hongbing Yang Geng 《Journal of Electronics(China)》 2008年第4期495-502,共8页
Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme ... Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme for wireless sensor networks due to limitations of the power,com-putation capability and storage resources.In this paper,an efficient key agreement and encryptionscheme for wireless sensor networks is presented.Results of analysis and simulations among the pro-posed scheme and other schemes show that the proposed scheme has some advantages in terms ofenergy consumption,computation requirement,storage requirement and security. 展开更多
关键词 Wireless sensor networks Network security Key agreement ENCRYPTION
下载PDF
Application Research of Computer Network Technology in Mining Railway Transport Management System 被引量:2
7
作者 余静 王振军 才庆祥 《Journal of China University of Mining and Technology》 2002年第1期57-60,共4页
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi... This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given. 展开更多
关键词 mining railway transport management computer network SECURITY reliability
下载PDF
Cost management based security framework in mobile ad hoc networks
8
作者 YANG Rui-jun XIA Qi +2 位作者 PAN Qun-hua WANG Wei-nong LI Ming-lu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期493-501,共9页
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ... Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks. 展开更多
关键词 Network attacks Mobile ad hoc Cost management Security framework
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
9
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
Development of Virtual Account System for Research Projects Based on J2EE
10
作者 张利 曾献辉 +1 位作者 邵世煌 罗丽丽 《Journal of Donghua University(English Edition)》 EI CAS 2006年第1期8-11,共4页
Based on the analysis of developing target, function and constitution of research projects system for remote management, the virtual account system is established on 3 layers of B/S mode. The development process of vi... Based on the analysis of developing target, function and constitution of research projects system for remote management, the virtual account system is established on 3 layers of B/S mode. The development process of virtual account system is realized by JSP/Servlets development language and MySQL database under windows server 2003 platform. At the same time, network security module of the system has been realized to reduce the influence caused by network security incidents. The system is capable of updating the information of vertical and horizontal projects dynamically and assigning virtual funds on WWW. Also, it realizes the query, statistical analysis function and so on. Practical results show that the system is a successful system for analyzing the various projects index of different departments. 展开更多
关键词 virtual account remote management JSP/servlets network security.
下载PDF
Discussion on the ARP Protocol and Network Security Policy
11
《International English Education Research》 2014年第1期35-38,共4页
Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol AR P virus are two c... Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol AR P virus are two common attacks from the IP address to the security risks that exist in the physical address resolution process, and then analyzes in detail, and then introduces the AR P Find virus source and virus removal methods, and finally putting forward effective measures to guard against AR P virus. 展开更多
关键词 Address resolution ARP spoofing attacks Cache table IP / MAC binding
下载PDF
Situational Awareness Technology in Network Security
12
作者 YeZheng-wang 《International Journal of Technology Management》 2014年第4期42-44,共3页
With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security ri... With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures. 展开更多
关键词 NETWORK SAFETY situational awareness INVASION APPLICATION
下载PDF
An Immunization Strategy for Social Network Worms Based on Network Vertex Influence
13
作者 YANG Wei WANG Haibo YAO Yu 《China Communications》 SCIE CSCD 2015年第7期154-166,共13页
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i... Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms. 展开更多
关键词 social network worm immunization strategy network security worm propagation worm containment
下载PDF
A Design of the Network Security Evaluation System
14
作者 Ziyan Shi Guolin Zhao Qiaolin Hu 《International Journal of Technology Management》 2014年第9期103-105,共3页
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat... The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security 展开更多
关键词 Security Evaluation Security Rules Evaluation Algorithm
下载PDF
Research on Network Platform of Information Management and Security
15
作者 Xiang Xin 《International Journal of Technology Management》 2013年第2期107-109,共3页
With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of netwo... With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance. 展开更多
关键词 information security real-time monitoring network security
下载PDF
Research on Heterogeneous Network Security Devices
16
作者 Yishui Lin Tingting Yu 《International Journal of Technology Management》 2013年第3期23-27,共5页
With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to de... With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices. 展开更多
关键词 heterogeneous networks security management security equipment
下载PDF
The solution and management of VPN based IPSec technology
17
作者 GUO-FANG ZHANG 《International Journal of Technology Management》 2014年第7期124-129,共6页
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. Ira secure connection is necessary then a virtual private network(VPN) is essential... The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. Ira secure connection is necessary then a virtual private network(VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site- to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network. 展开更多
关键词 VPN IPSEC ENCRYPTION AUTHENTICATION
下载PDF
Research about Online Security Warning and Risk Assessment of Power Grid Based on Energy Management System
18
作者 Hanyun Wang Kangyuan Wang +2 位作者 Yunxiao Zhang Guoqiang Mei Mingming Wu 《Journal of Energy and Power Engineering》 2012年第3期485-487,共3页
In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and ... In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and external operating environment. It combines the two factors, contingency likelihood and severity, that determine system reliability, into risk indices on different loads and operation modes, which provide precise evaluation of the power grid's security performance. According to these indices, it can know the vulnerable area of the system and whether the normal operating mode or repair mode is over-limited or not, and provide decision-making support for dispatchers. Common cause outages and equipment-aging are considered in terms of the establishment of outage model. Multiple risk indices are defined in order to reflect the risk level of the power grid more comprehensively. 展开更多
关键词 EMS (energy management system) online security warning risk assessment.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部