首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
在系统地介绍了中间件层采用实时CORBA的MILS三层软件结构的基础上,根据MILS多级安全与CORBA对象请求代理相结合的特殊性,指出系统存在的常见安全威胁与迫切的安全需求。同时针对上述问题,分析了中间件CORBA与安全服务有关的重要组件,并给出在CORBA内部应用拦截器和安全服务实现访问控制机制的基本原理与流程,其中访问控制规则采用改进的BLP算法,最后对安全性改善做了详细说明。  相似文献   

2.
王浩  陈泽茂  谌双双 《计算机工程》2012,38(21):141-144
为保证局域网环境下共享信息的机密性,提出一种基于BLP模型的局域网多级安全模型MLS-LAN。引入密级标定部件,标定动态信息资源的安全级别,利用接入认证部件和访问控制部件,定义接入认证、信息共享和通信关系控制等规则,由此实现多级信息资源的安全共享。理论分析结果表明,该模型可以对信息共享实施可靠的访问控制,提高了局域网信息共享的安全性。  相似文献   

3.
《工业控制计算机》2009,22(1):88-88
全球领先的设备软件优化(DSO)厂商风河系统公司(Wind River)目前宣布,航空与国防领域的四家顶尖供应商将合作展示基于风河Wind River VxWorks MILS Platform 2.0的MLS(多级别安全)技术。采用MILS(多层独立级别安全技术)架构,设备厂商可开发具有对所有级别机密数据并发处理能力的多级别安全系统,包括downgrader、guard和其他跨域应用等。  相似文献   

4.
实时CORBA系统中ORB间通信机制研究   总被引:2,自引:0,他引:2  
实时CORBA系统是一类重要的分布式中间件,它不仅具有实时系统的特征,而且具有网络通信的特征,其ORB间实时通信的实现是系统满足实时性的一个关键。本文着重在实时CORBA规范1.1的基础上探讨ORB之间通信的机制,同时简要介绍了TAO系统对实时CORBA规范所作出的改进,最后简要阐述了自己对开发实时CORBA应用系统的观点。  相似文献   

5.
多级安全(MLS)是网络等级保护的实质内容,目前却没有真正的MLS解决方案。现在等级保护的方法——多个独立的安全级别(MILS)中,边界防护是最为重要的机制之一。本文较为全面细致地论述了可以用于MILS的各种边界防护机制,并提出一种综合的边界防护机制——数据交换中心,通过各种机制的合作与联动达到等级保护的良好效果。该综合机制在实际应用中表现良好。  相似文献   

6.
为了提高分布式环境下多级安全实施的正确性和可行性,提出了一个分布式多级安全保护核心架构--分布式可信计算基(DTCB)。DTCB具有三层结构,包括系统层可信计算基、模块层可信计算基和分区层可信计算基,实现了从模块间、分区间到分区内部的逐步细化的信息流和访问控制,有效降低了分布式环境下多级安全实施的复杂性。最后,采用组合无干扰模型形式化证明了DTCB的安全性,结果表明,DTCB能够从整体上为分布式系统提供较好的多级安全保护。  相似文献   

7.
介绍实时CORBA规范,对其体系结构及实时CORBA扩展进行分析和总结,并将其引入到用电信息采集系统的设计中。在此基础上,提出一种基于实时中间件产品TAO的用电信息采集系统设计方案,论述基于TAO的用电信息采集系统通信架构及核心模块设计。重点分析了优先级机制、线程池机制、实时调度服务、实时事件服务等TAO关键技术在用电信息采集系统开发中的应用。  相似文献   

8.
为基于不可信计算机系统来构建一个可信的多级安全(MLS)大系统,提出一种新型的跨域引用监视器及其多级安全模型。该跨域引用监视器采用现有的商业现货(COTS)产品,使用一个或多个独立的计算机,在两个或多个不同的网络之间,通过满足EAL7的单向传输硬件装置来连接。基于该跨域监视器实现了以数据为中心的多级安全模型。该模型允许信息从低密级网络流向高密级网络,也允许高密级网络把低密级数据发布给低密级网络,禁止高密级网络的高密级信息和无密级标记信息流向低密级网络,并已在分级保护的网络系统中成功应用。通过安全模型和安全策略的形式化描述和证明表明,基于该安全模型构建可信MLS大系统是可行的。  相似文献   

9.
一种基于CORBA的多级网络管理系统的设计与实现   总被引:4,自引:0,他引:4  
分布计算技术正日益成为通信界网络管理的一个热点技术。以电信网络管理的应用为背景,提出了基于CORBA的多级网络管理体系结构MHMN(multi-hierarchy network management architeutur)。并采用pseudoagent分布式管理和被管对象MO(managed object)分类预取值Cache技术,设计了一个多级网络管理系统MHNMs(MHNM system),该系统可提供多对象快速访问的功能,从而为CORBA应用到实际网络管理提供了性能保证。  相似文献   

10.
针对传统IPsec无法解决多级安全网络环境下的通信问题,提出一种基于隐式安全标记的IPsec方案。通过引入隐式安全标记,改进IKE、ESP协议处理流程,将IPsec SA与隐式安全标记有效绑定,并依据所保护数据信息的重要程度,协商标记SA时选取强度不同的算法及密钥,动态构建多密级标记保护隧道,实现不同密级数据流的逻辑隔离及安全通信。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号