期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
The Pancharatnam Phase of a Three-Level Atom Coupled to Two Systems of N-Two Level Atoms
1
作者 D. A. M. Abo-Kahla 《Journal of Quantum Information Science》 2016年第1期44-55,共12页
In this paper, we present the analytical solution for the model that describes the interaction between a three-level atom and two systems of N-two level atoms. The effects of the quantum numbers and the coupling param... In this paper, we present the analytical solution for the model that describes the interaction between a three-level atom and two systems of N-two level atoms. The effects of the quantum numbers and the coupling parameters between spins on the Pancharatnam phase and the atomic inversion, for some special cases of the initial states, are investigated. The comparison between the two effects shows that the analytic results are well consistent. 展开更多
关键词 Pancharatnam Phase Atomic Inversion systems of N-Two Level Atoms
下载PDF
Design of secure operating systems with high security levels 被引量:5
2
作者 QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
Formal verification with HiLLS-specified models:A further step in multi-analysis modeling of complex systems
3
作者 Kehinde G.Samuel Oumar Maiga Mamadou K.Traor′e 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2019年第5期82-107,共26页
The multi-analysis modeling of a complex system is the act of building a family of models which allows to cover a large spectrum of analysis methods(such as simulation,formal methods,enactment,...)that can be performe... The multi-analysis modeling of a complex system is the act of building a family of models which allows to cover a large spectrum of analysis methods(such as simulation,formal methods,enactment,...)that can be performed to derive various properties of this system.The High-Level Language for Systems Specification(HiLLS)has recently been introduced as a graphical language for discrete event simulation,with potential for other types of analysis,like enactment for rapid system prototyping.HiLLS defines an automata language that also opens the way to formal verification.This paper provides the building blocks for such a feature.That way,a unique model can be used not only to perform both simulation and enactment experiments but also to allow the logical analysis of properties without running any experiment.Therefore,it saves from the effort of building three different analysis-specific models and the need to align them semantically. 展开更多
关键词 Discrete Event System Specification(DEVS) High Level Language for systems Specification(HiLLS) multi-analysis modeling discrete event simulation model checking
原文传递
INCIDENCE MATRIX APPROACH FOR CALCULATING READINESS LEVELS 被引量:1
4
作者 Mark A.London Thomas H.Holzer +1 位作者 Timothy J.Eveleigh Shahryar Sarkani 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2014年第4期377-403,共27页
Contemporary system maturity assessment approaches have failed to provide robust quantitative system evaluations resulting in increased program costs and developmental risks.Standard assessment metrics,such as Technol... Contemporary system maturity assessment approaches have failed to provide robust quantitative system evaluations resulting in increased program costs and developmental risks.Standard assessment metrics,such as Technology Readiness Levels(TRL),do not sufficiently evaluate increasingly complex systems.The System Readiness Level(SRL)is a newly developed system development metric that is a mathematical function of TRL and Integration Readiness Level(IRL) values for the components and connections of a particular system.SRL acceptance has been hindered because of concerns over SRL mathematical operations that may lead to inaccurate system readiness assessments.These inaccurate system readiness assessments are called readiness reversals.A new SRL calculation method using incidence matrices is proposed to alleviate these mathematical concerns.The presence of SRL readiness reversal is modeled for four SRL calculation methods across several system configurations.Logistic regression analysis demonstrates that the proposed Incidence Matrix SRL(IMSRL)method has a decreased presence of readiness reversal than other approaches suggested in the literature.Viable SRL methods will foster greater SRL adoption by systems engineering professionals and will support system development risk reduction goals. 展开更多
关键词 Technology Readiness Level(TRL) integration readiness level(IRL) system readiness level(SRL) system readiness graph theory systems engineering
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部