期刊文献+

利用局域网构建安全的信息化高校实验室 被引量:3

Using LAN to construct a safe information college laboratory
在线阅读 下载PDF
导出
摘要 探讨了如何利用局域网技术开发信息资源,促进信息交流和知识共享,提高资源设备利用率和教学科研效率,改变实验室内部信息孤岛的状况,构建一个安全的信息化实验室。具体讨论了局域网的树形拓扑结构设计、网络和信息安全设计、IP地址规划以及部署在其上的服务和功能。该局域网方案实现了实验室内的软硬件资源的共享、点对点通讯、仪器设备远程化操作、分布式实验数据库系统、分布式存储和计算、团队协作式开发、信息化管理、Web服务、Email和传真服务等一系列功能,提高了实验室信息化水平,取得了良好的应用效果。 This paper discusses how to use local area network (LAN) technology to develop information resources, to promote information exchange and knowledge sharing, to improve resource utilization and efficiency of teaching and research, to change the situation of inside information island and construct a safe information college laboratory. Design of tree topology, network and information security, IP address planning, and deployment of services and functions on it are discussed in detail. The laboratory LAN designed implements functions of laboratory resource sharing, peer to peer communications, instrumentation equipment, remote-based operations, distributed databases experiment, distributed storage and computing, collaborative team development, information management, web services, Email and fax services and secrecy services needs. This LAN program improves the information level of laboratory and obtains good application effect.
出处 《电子设计工程》 2011年第8期92-96,共5页 Electronic Design Engineering
基金 国家自然科学基金资助项目(10776026)
关键词 局域网 安全 信息化 高校实验室 LAN safe informatization technology college laboratory
作者简介 刘亚峰(1979-),男,甘肃庆阳人,硕士,助理工程师。研究方向:智能网络与网络安全。
  • 相关文献

参考文献5

二级参考文献23

  • 1黄敏,曹加恒,彭智勇.基于可信第三方的数据库水印安全协议[J].武汉大学学报(理学版),2007,53(3):297-300. 被引量:1
  • 2Garfinkel S Spafford G.Practical Unix & Internet Security[M].北京:电子工业出版社,1999.134-150.
  • 3Sion R, Atallah M, Prabhakar S. Rights protection for relational data. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(12): 1509-1525
  • 4Swarup V, Li Y, Jajodia S. Fingerprinting relational databases: Schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1); 34-45
  • 5Agrawal R, Kiernan J. Watermarking relational databases: Framework, algorithms and analysis. The International Journal on Very Large Data Bases, 2003, 12(2): 157-169
  • 6Guo F, Wang J M, Li D Y. Fingerprinting relational databases//Proceedings of the 2006 ACM Symposium on Applied computing. Dijon, France, 2006: 487-492
  • 7Li Y, Deng R H. Publicly verifiable ownership protection for relational databases//Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM, 2006: 78-89
  • 8Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization-based techniques. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(1): 1041-4347
  • 9Gross-Amblard D. Query-preserving watermarking of relational databases and XML documents//Proceedings of the 2003 ACM Symposium on Principles of Database Systems. San Diego, California, USA, 2003: 191-201
  • 10Housley R, Ford W, Polk W, Solo D. Internet X. 509 public key infrastructure certificate and crl profile. July 2, 2005

共引文献43

同被引文献22

引证文献3

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部