首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
王宇 《中国计算机用户》2004,(32):i001-i001
网络安全设备正在成为网络性能的一个瓶颈,以防火墙为例,企业用户迫切需要它做到在宽带环境下网络数据包的线速安全处理,以及多种应用协议分析与安全处理。从千兆防火墙硬件实现技术看,主要有3大体系结构,它们各自的特点鲜明。 1、IA架构Intel X86架构的硬件以其高灵活性和扩展  相似文献   

2.
李晓明 《微机发展》2004,14(6):104-105,108
随着宽带网络的日益普及,网络安全已成为信息技术领域一个重要的议题,现有的防火墙架构已无法满足高速网络环境下的应用。网络处理器是专为IP网络包处理设计的芯片,能够以线速处理网络传输数据。文中论述了网络处理器的体系结构和功能,并通过分析防火墙的几种不同架构,给出一种基于网络处理器的实现方案,为千兆网络提供了路由、过滤,以及网络地址转换等安全防护措施的实现。最后指出了该方案在网络安全领域的应用前景以及网络安全设备的发展方向。  相似文献   

3.
随着宽带网络的日益普及,网络安全已成为信息技术领域一个重要的议题,现有的防火墙架构已无法满足高速网络环境下的应用.网络处理器是专为IP网络包处理设计的芯片,能够以线速处理网络传输数据.文中论述了网络处理器的体系结构和功能,并通过分析防火墙的几种不同架构,给出一种基于网络处理器的实现方案,为千兆网络提供了路由、过滤,以及网络地址转换等安全防护措施的实现.最后指出了该方案在网络安全领域的应用前景以及网络安全设备的发展方向.  相似文献   

4.
以防火墙作为重心的网络安全体系,已成为人们日常生活中十分依赖的安全产品。通过在内外网交界的位置设置防火墙来降低传输延迟、检测病毒攻击,有着非常显著的效果。笔者在分析防火墙概念以及功能与分类的基础上,提出了初步的以防火墙技术为重心的网络安全体系架构,并对其中的关键技术进行了详细的介绍,希望能够为网络安全事业的发展提供一些有益的帮助。  相似文献   

5.
防火墙是网络安全的基础保障技术,也是网络安全的首道防护。介绍依托防火墙技术的网络安全架构,论述了依托防火墙技术的网络安全系统设计需求和内容,并对依托防火墙技术的网络安全系统实现与测试进行了探究,以期为基于防火墙技术的网络安全系统设计提供一些参考。  相似文献   

6.
网络的应用和发展促进了网络安全技术的发展,防火墙技术一直是保护网络安全的主要技术。文章在分析了过界防火墙在当前网络安全应用中存在的缺陷基础上,讨论了分布式防火墙的体系结构,并给出了其在IDC中的应用。指出:分布式防火墙是网络安全发展的重要方向。  相似文献   

7.
高光谱图像分类算法通常需要逐点对图像中的像素点进行迭代处理,计算复杂度及并行程度存在较大差异。随着高光谱遥感图像空间、光谱和辐射分辨率的不断提升,这些算法无法满足实时处理海量遥感图像数据的需求。通过分析NPU存储计算一体化模式与遥感图像分类算法的实现步骤,设计低功耗CPU+NPU异构资源计算架构的低秩稀疏子空间聚类(LRSSC)算法,将数据密集型计算转移至NPU,并利用NPU数据驱动并行计算和内置AI加速,对基于机器学习算法的海量遥感数据进行实时分类。受到big.LITTLE计算范式的启发,CPU+NPU异构资源计算架构由8 bit和低精度位宽NPU共同组成以提高整体吞吐量,同时减少图网络推理过程中的能量损耗。实验结果表明,与CPU计算架构和CPU+GPU异构计算架构的LRSSC算法相比,CPU+NPU异构计算架构的LRSSC算法在Pavia University遥感数据集下的计算速度提升了3~14倍。  相似文献   

8.
随着全球网络化进程的不断加深,互联网安全成为了网络发展的瓶颈。针对于此,该文主要介绍传统的网络安全设备——防火墙,在目前网络安全防护当中的缺陷与不足,并针对网络防护的发展局势,介绍下一代防火墙这种新技术的体系结构特征,突出它在功能和性能上的优势。  相似文献   

9.
随着网络技术的不断发展,传统的防火墙已经逐渐不能满足网络安全的需要。针对有传统防火墙所带来的问题,提出了一种基于Kerberos认证的分布式防火墙的新型体系结构,在保留传统防火墙优点的基础上,解决了传统防火墙的不安全隐患。为大量内部网络用户,需要重点保护的网络资源提供一个可管理的、分布式的安全网络环境。  相似文献   

10.
随着网络技术的不断发展,传统的防火墙已经逐渐不能满足网络安全的需要.针对有传统防火墙所带来的问题,提出了一种基于Kerberos认证的分布式防火墙的新型体系结构,在保留传统防火墙优点的基础上,解决了传统防火墙的不安全隐患.为大量内部网络用户,需要重点保护的网络资源提供一个可管理的、分布式的安全网络环境.  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号