期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
1
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
Self-Organization Approaches for Optimization in Cognitive Radio Networks 被引量:1
2
作者 XU Xu CHAI Xiaomeng ZHANG Zhongshan 《China Communications》 SCIE CSCD 2014年第4期121-129,共9页
Cognitive radio(CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques.However,c... Cognitive radio(CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques.However,cognitive radio networks(CRNs)may also impose some challenges due to the ever increasing complexity of network architecture,the increasing complexity with configuration and management of large-scale networks,fluctuating nature of the available spectrum,diverse Quality-of-Service(QoS)requirements of various applications,and the intensifying difficulties of centralized control,etc.Spectrum management functions with self-organization features can be used to address these challenges and realize this new network paradigm.In this paper,fundamentals of CR,including spectrum sensing,spectrum management,spectrum mobility and spectrum sharing,have been surveyed,with their paradigms of self-organization being emphasized.Variant aspects of selforganization paradigms in CRNs,including critical functionalities of Media Access Control(MAC)- and network-layer operations,are surveyed and compared.Furthermore,new directions and open problems in CRNs are also identified in this survey. 展开更多
关键词 cognitive radio self-organized networking heterogeneous machine-to-machine DECENTRALIZED load balancing cooperation.
下载PDF
浅谈计算机网络安全与应用
3
作者 戴璇 《中小学电教(下)》 2009年第7期2-2,共1页
随着信息化领域的不断扩展,各类网络版应用软件推广应用,计算机网络在提高数据传输效率,实现数据集中、数据共享等方面发挥着越来越重要的作用。
关键词 网络安全 计算机网 网络与信息 应用软件 数据传输效率 数据共享 入侵检测系统 恶意软件 访问控制技
原文传递
计算机网络系统的安全防范
4
作者 陈志强 《中小学电教(下)》 2010年第1期31-31,共1页
随着计算机网络的普及和发展,人们的生活和工作越来越依赖于网络,与此相关的计算机网络安全问题也随之凸显出来,计算机网络安全和防范方法也逐渐成为企业计算机网络系统运行所面临的主要问题。
关键词 网络系统 网络安全 企业计算机网络 防范方法 防病毒程序 企业网 入侵检测系统 数据安全 访问控制技
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部