共查询到20条相似文献,搜索用时 15 毫秒
1.
An embedded system is a system that computer is used as a component in a larger device.In this paper,we study hybridity in embedded systems and present an interval based temporal logic to express and reason about hybrid properties of such kind of systems. 相似文献
2.
A Solution of Data Inconsistencies in Data Integration ——- Designed for Pervasive Computing Environment 下载免费PDF全文
New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data quality criteria and expense quality criteria for data sources to solve data inconsistency. In our ... 相似文献
3.
Teng Lv Ping Yan Zhenxing Wang 《通讯和计算机》2005,2(11):49-51,71
This paper analyzes the most common security problems of web application level. A model WALSG (Web Application Level Security Gateway) is presented to provide web application level security. WALSG employs XML Schema to specify access control policies and security policies for HTML pages and cookies. WALSG can also be used as a secure tool to define access control policies and security policies with the development of web site. 相似文献
4.
BCL—3:Aigh Performance Basic Communication Protocol for Commodity Superserver DAWNING—3000 下载免费PDF全文
This paper introduces the design and implemetation of BCL-3,a high performance low-level communication software running on a cluster of SMPs(CLUMPS) called DAWNING-3000,BCL-3 provides flexible and sufficient functionality to fulfill the communication requirements of fundamental system software developed for DAWNING-3000 while guaranteeing security,scalability,and reliability,Important features of BCL-3 are presented in the paper,including special support for SMP and heterogeneous network environment,semiuser-level communication,reliable and ordered data transfer and scalable flow control,The performance evaluation of BCL-3 over Myrinet is also given. 相似文献
5.
6.
秦俊波 《计算机光盘软件与应用》2014,(12):186-186
网络安全协议是营造网络安全环境的基础,是构建安全网络的关键技术。设计并保证网络安全协议的安全性和正确性能够从基础上保证网络安全,避免因网络安全等级不够而导致网络数据信息丢失或文件损坏等信息泄露问题。在计算机网络应用中,人们对计算机通信的安全协议进行了大量的研究,以提高网络信息传输的安全性。本文通过分析网络安全协议的设计和分析方法,探讨网络安全协议在计算机通信技术中的作用及意义。 相似文献
7.
1.引言随着网络信息技术的普及,网络设备和信息服务器、终端在政府、国防、金融、商务等各行各业广泛应用,信息安全问题日益突出。操作系统是应用的基石,所以保障信息安全的需求对操作系统本身的安全提出了挑战,需要找到既满足功能、性能要求,又具备足够的安全可信度的操作系统,而研究适用的安全核(Security Kernel)机制是开发安全操作系统中的首要工作。TESEC(美国国防部可信计算机评估标准)等标准要求在系统中实现DAC(自主访问控制)和MAC(强制访问控 相似文献
8.
Personal photo revisitation on smart phones is a common yet uneasy task for users due to the large volume of photos taken in daily life. Inspired by the human memory and its natural recall characterist... 相似文献
9.
网络的发展永远都是双刃剑,它给人们带来了无限沟通的同时也带来永无止境的安全问题,人们在进入网络时代的同时也跌入了一个病毒的时代。而后来反病毒厂商的兴起使人们终于可以轻松地拿起杀毒软件的利器向病毒们的头上砍去,于是病毒成为了可以被控制的“杀手”,于是我们随之进入了后病毒时代。虽然病毒在后病毒时代里已经成为一个相对弱势的群体,但黑暗势力的发展,又塑造了一个新的杀手—“垃圾邮件”,它的出现使得 相似文献
10.
随着计算机技术的日趋提高与完善,出现了能对计算机安全构成严重威胁的计算机病毒。计算机病毒从最初无意的发现和研究,到有意的恶作剧,直至有针对性的破坏,只有短短的几年时间。然而,国内外专家却已把计算机病毒列为21世纪国际恐怖活动采用的新式武器之一。计算机病毒用于战争的可能性在当今信息时代,计算机的先进性和普及程度是衡量一个国家国防现代化和军事威慑力量的重要标志。计算机作为军队电子系统(csl系统和武器系统)的控制核心,已成为现代军队武器装备必不可少的重要部分。放研制有效的攻击型计算机病毒用于破坏敌方的军… 相似文献
11.
12.
Routing protocols play an important role in the Internet and the test requirements are running up.To test routing protocols more efficiently,several enhancing techniques are applied in the protocol integrated test system described in this paper.The Implementation Under Test is modeled as a black box with windows.The test system is endowed with multiple channels and multiple ports to test distributed protocols.The test suite and other related aspects are also extended.Meanwhile,the passive testing is introduced to test,analyze and manage routing protocols in the production field,which is able to perform the conformance test,the interoperability test and the performance test.The state machine of peer sessions is tested with the state synchronization algorithm,and the routing information manipulation and other operations are checked and analyzed with the methods like the topology analysis and the internal process simulation,With both the active testing and the passive testing,the routing protool test is going further and more thoroughly and helps a lot in the developmnt of routers。 相似文献
13.
Spi演算是M.Abadi和A.D.Gordon在pi演算基础上加以扩充,从而实现用pi演算来描述和分析基于密码学的安全协议的模型。pi演算作为并发计算的基础,其最重要之处是引入了通道(channel)的概念。通过产生并将这种有名字的通道传送给其它进程可以在这些进程之间建立起新的通信。通道具有确定的作用域(scope),作用域之外的进程不能对该通道进行存取,这在一定程度上提供 相似文献
14.
15.
Lucian L. Visinescu Olajumoke Azogu Sherry D. Ryan Yu “Andy” Wu 《International journal of human-computer interaction》2016,32(11):885-900
Since the use of network-based storage as a cloud computing service [Storage as a Service (StaaS)] becomes ubiquitous, users who store data in the cloud are exposed to risk and potentially severe consequences. Therefore, individuals should carefully consider security and privacy issues when using StaaS. Drawing upon the principle of self-preservation and the theory of protection motivation, this study develops a research model explaining the mechanisms leading to the development of a protection strategy for individuals’ safe use of StaaS and empirically tests the proposed model. The results show that the natural propensity to trust, an individual trait, influences an individual’s need for privacy. This, in turn, along with perception of privacy risk, significantly affects individuals’ perception of the need to protect themselves. Three coping appraisal factors, preventive measures, self-efficacy, and willingness to incur cost of prevention, together with the individual perceived need to protect self, directly and positively affect users’ need to develop a protection strategy in a cloud computing environment. Theoretical and practical implications are discussed. 相似文献
16.
《计算机科学技术学报》2014,29(1):1-1
Since its inaugural issue in 1986, the Journal of Computer Science and Technology (JCST) has been the premier English journal of China Computer Federation (CCF), serving international readers and authors by disseminating scholarly and technical papers under a rigorous review process. 相似文献
17.
18.
网络安全协议是计算机通信技术推广的重要组成部分,以现阶段计算机通信技术的应用情况为基础,结合近年来网络安全协议的特点,分析计算机通信技术中网络安全协议的应用. 相似文献
19.
Information Systems Frontiers - The protection of organizational information and information systems (IS) is a socio-technical issue and requires insiders take on a more proactive set of security... 相似文献
20.