共查询到18条相似文献,搜索用时 250 毫秒
1.
2.
3.
4.
5.
基于响应时间的可调度分析是设计硬实时系统的基础.防危核(壳)是安全关键硬实时系统的一种新防危措施,现有的普适响应时间分析方法不能适用于这类系统.本文的贡献在于采用检测点时间冗余容错和优先级提升思想,通过分析内/外错误、隐/显错误,提出了一种合适的响应时间分析方法,从而为这类系统提供有效的离线可调度分析工具,同时也为这类系统设计了一种基于检测点的容错方案.本方法稍作修改也可为其它安全关键系统服务.最后通过仿真实验验证了本方法的有效性和优越性. 相似文献
6.
在分布式系统中如何挖掘关联规则是研究数据挖掘方面的重要课题之一。在分布式系统中的关联规则通信方面,本文进行了关联规则的建立等问题进行了探讨,提出一种新的建立关联规则的算法ARDR,主要表现在通信方面和关联规则完整性方面有一定的优化。 相似文献
7.
建立信息系统研发安全培训体系是保障商业银行信息安全的有力措施.该文通过总结商业银行信息系统研发安全培训现状与问题,结合国家相关监管要求,提出建立商业银行信息系统研发培训体系的目标和原则,从课程设置、培训对象、体系构建三方面阐述了体系建设方案的具体内容,最后提出整合培训师资、丰富培训形式、完善考核评估和激励机制、确保资源投入、做好档案管理等相关保障措施. 相似文献
8.
文章介绍了web应用目前面临的主要安全风险和web安全防护目标,给出一种基于管理制度、安全平台和响应机制为一体的安全防护体系,并提出了针对这种安全防护体系的安全评估手段,进一步保障了安全防护体系的有效性和强壮性. 相似文献
9.
《电子产品可靠性与环境试验》2006,24(3):25
据中国国家标准委员会透露,热水器“防电墙技术”将被国家标准化委员会定为1类加强型标准,吸纳了防电墙技术的新的国家标准一经实施,不具备该安全技术的热水器产品就将无法上市销售。当前热水器市场竞争已趋白热化,新标准的出台无疑是对我国现行热水器行业标准的提高,它将以保障我国家庭洗浴的安全为主,对企业的生产技术和产品质量提出要求,并对行业发展有一个全新的规范和引领作用。 相似文献
10.
介绍了卫星信号防非安全监测和应急切换系统的设计与实现,可以帮助有线数字电视信号传输部门对信源卫星信号进行防非安全监测,当卫星信号受到非法攻击或故障时能够通过应急切换系统进行安全切换,保障安全播出.该系统已在全国各地的有线数字电视信号传输机房投入使用,为广播电视信号的安全接收和传输保驾护航. 相似文献
11.
A Software Safety Requirements Elicitation Approach Based on Hazardous Control Action Tree Modelling
Software safety requirements are crucial for safety assurance of safety-critical software systems.A novel accident causality model,Systems-theoretic accident modeling and processes (STAMP),has been proposed to overcome the limitations of traditional safety techniques in software safety requirements elicitation.However,the STAMP-based method is ad-hoc with no rigorous procedure to elicit software safety requirements effectively.Furthermore,the time-related safety requirements,which are important to software safety,have been paid little attention in STAMP-based method.With the purpose of overcoming these limitations,this paper strives to find a systematic approach to elicit software safety requirements with STAMP,especially the time-related safety requirements.Firstly,a new process model of STAMP is proposed to model all the system varilables and the ralationship of them in control processes.Then based on the process model,an approach HCAT-SSRA is proposed to elicit the software safety requirements by building Hazardous control action tree (HCAT) for each control action in system control processes.Additionally,several rules are proposed to guide time-related software safety requirements analysis.Finally,a case study is given to illustrate the availability and feasibility of the proposed method. 相似文献
12.
13.
B.B. Anderson J.V. Hansen P.B. Lowry S.L. Summers 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2005,35(3):445-450
Model checking is a promising technique for the verification of complex software systems. As the use of the Internet for conducting e-business extends the reach of many organizations, well-designed software becomes the foundation of reliable implementation of e-business processes. These distributed, electronic methods of conducting transactions place reliance on the control structures embedded in the transaction processes. Deficiencies in control structures of processes that support e-business can lead to loss of physical assets, digital assets, money, and consumer confidence. Yet, assessing the reliability of e-business processes is complex and time-consuming. This paper explicates how model-checking technology can aid in the design and assurance of e-business processes in complex digital environments. Specifically, we demonstrate how model checking can be used to verify e-business requirements concerning money atomicity, goods atomicity, valid receipt, and communication-link failure. These requirements are fundamental to many e-business applications. Model checking can be used to test a broad range of systems requirements-not only for system designers, but also for auditors and security specialists. Systems that are examined by auditors need to have adequate controls built in prior to implementation and will need adequate auditing after implementation to ensure that none of the processes have been corrupted. Model checkers may also provide value in examining the processes of highly integrated applications as found in enterprise resource planning systems. 相似文献
14.
15.
基于角色的工作流安全模型的研究与实现 总被引:1,自引:0,他引:1
随着计算机和互联网领域的迅速发展,现代信息系统的分布性、异构性和自治性的特征越来越显著,相应的信息资源也分布在异构的计算机环境中,信息源之间的连接表现出松散耦合的特点,在这种大规模分布式环境下对分布式工作流管理系统的权限管理也提出了更高要求.访问控制是工作流管理系统设计中的关键环节,是系统安全的重要保障,文中分析了基于群组改进的访问控制模型,通过把群组引入到工作流系统的权限管理系统,把各个不同的用户具有相同的角色集归为同一用户群组,对多个用户的授权压缩为对同一群组授权,减少了授权工作量,并给出了基于该模型的权限管理系统关键技术的具体实现. 相似文献
16.
17.
Gill C.D. Cytron R.K. Schmidt D.C. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2003,91(1):183-197
Increasingly complex requirements, coupled with tighter economic and organizational constraints, are making it hard to build complex distributed real-time embedded (DRE) systems entirely from scratch. Therefore, the proportion of DRE systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly. There are relatively few systematic empirical studies, however, that illustrate how suitable COTS-based hardware and software have become for mission-critical DRE systems. This paper provides the following contributions to the study of real-time quality-of-service (QoS) assurance and performance in COTS-based DRE systems: it presents evidence that flexible configuration of COTS middleware mechanisms, and the operating system (OS) settings they use, allows DRE systems to meet critical QoS requirements over a wider range of load and jitter conditions than statically configured systems; it shows that in addition to making critical QoS assurances, noncritical QoS performance can be improved through flexible support for alternative scheduling strategies; and it presents an empirical study of three canonical scheduling strategies; specifically the conditions that predict success of a strategy for a production-quality DRE avionics mission computing system. Our results show that applying a flexible scheduling framework to COTS hardware, OSs, and middleware improves real-time QoS assurance and performance for mission-critical DRE systems. 相似文献
18.
移动支付安全业务系统设计方案 总被引:1,自引:0,他引:1
提出一种能够支持远程和现场两种模式的移动支付业务系统设计方案,分析业务系统架构及其功能模块,并详细阐述了业务系统中核心部分——支付系统的信息安全保障。 相似文献