期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Study of Enterprise Equipment Maintenance Management Integrated Information System Based on B/S 被引量:3
1
作者 HAO Lina XU Xinhe 《International Journal of Plant Engineering and Management》 2000年第4期154-160,共7页
Equipment maintenance management integrated information system is an important constituent part of enterprise IMS (Intelligent Manufacture System). The system should make the best of all kinds of information sources a... Equipment maintenance management integrated information system is an important constituent part of enterprise IMS (Intelligent Manufacture System). The system should make the best of all kinds of information sources around the enterprise, and meet the demand for agile production. This paper presents an implementation scheme of Integrated Equipment Maintenance Management Information System Based on Internet/Intranet and gives component division scheme of each tier. This scheme adopts a three-tiers mode of B/S (Browser/Server) and software programming module based on software reusing technology. This makes the system integrated and open, makes maintenance and updating convenient, and largely increases software safety and reusability. 展开更多
关键词 equipment maintenance management integrated information system COMPONENT INTERNET/INTRANET Browser/Server?
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
2
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部