期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Security integrated framework for semantic web based on social intelligence
1
作者 孟庆华 丁永生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期409-412,共4页
An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web mod... An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies. 展开更多
关键词 integrated security framework social intelligence closed-security-ring security-channel semantic web
下载PDF
Study on Security Technologies for Wireles Network Integration
2
作者 Feng Min (Department of Communication Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2006年第2期43-47,共5页
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw... The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes. 展开更多
关键词 security USA WLAN NODE IEEE IPSEC Study on security Technologies for Wireles Network Integration
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部