期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
SET协议安全控制分级模型
1
作者 童光才 《四川兵工学报》 CAS 2009年第4期121-122,125,共3页
SET协议又名安全电子交易协议,是专门为电子商务开发的一种安全协议,能保证网上交易的安全及网上支付的安全.通过对SET协议的分析研究,指出SET协议中存在的一些问题,针对存在的问题提出具体的解决方法,以便更好的改进和完善SET协议.
关键词 SET协议 SSL协议 安全控制分级模型
在线阅读 下载PDF
CBTC系统高速适应性分析及改进方案 被引量:1
2
作者 李晶 杨艳锋 《铁路计算机应用》 2023年第7期68-72,共5页
从车地无线通信、车载控制模型、轨旁设备应用等方面有针对性地研究了设计速度在160~200 km/h下基于通信的列车运行控制(CBTC,Communication Based Train Control)系统的高速适应性问题,提出了速度提升后CBTC系统相对应的改进方案。从... 从车地无线通信、车载控制模型、轨旁设备应用等方面有针对性地研究了设计速度在160~200 km/h下基于通信的列车运行控制(CBTC,Communication Based Train Control)系统的高速适应性问题,提出了速度提升后CBTC系统相对应的改进方案。从理论上分析,传统CBTC系统在完成适配性改进后,能够满足此速度等级下安全运行的要求。 展开更多
关键词 基于通信的列车运行控制(CBTC) 车地无线通信 安全控制模型 高速适应性 改进措施
在线阅读 下载PDF
液化天然气动力船通航脆弱性遗传耦合仿真 被引量:3
3
作者 胡甚平 李文晶 +2 位作者 李伟 刘明明 赵睿 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2022年第3期356-364,共9页
液化天然气动力船实施过程控制时存在安全脆弱性时序差异,本文采用系统理论过程分析方法对液化天然气动力船通航安全脆弱性进行遗传耦合风险分析。对液化天然气动力船通航过程进行安全脆弱性分析,得出灵敏性、暴露性和适应性影响因素,... 液化天然气动力船实施过程控制时存在安全脆弱性时序差异,本文采用系统理论过程分析方法对液化天然气动力船通航安全脆弱性进行遗传耦合风险分析。对液化天然气动力船通航过程进行安全脆弱性分析,得出灵敏性、暴露性和适应性影响因素,围绕船舶、燃料子系统以及外部环境系统等,提出基于系统控制思维的事故建模与安全控制方法。选择遗传算法,结合液化天然气动力船的系统组分以及外部环境进行基于系统理论事故模型和控制路径的因子耦合仿真,对液化天然气动力船通航时燃料供应脆弱性进行分析。在情景模拟下,分析船舶燃料供应过程中的脆弱性风险。仿真结果表明:液化天然气动力船通航过程中的安全涌现依赖遗传路径,需要全系统监测安全脆弱性,且需对供应系统和外部环境条件采取针对性的防护措施。 展开更多
关键词 液化天然气动力船 系统思维的事故模型安全控制 脆弱性 遗传算法 耦合作用 系统安全 海上交通风险 系统仿真
在线阅读 下载PDF
Optimization of Safety Production Supervision Mode of Coalmining Enterprises 被引量:3
4
作者 ZHOU Min XIAO Zhong-hai 《Journal of China University of Mining and Technology》 EI 2005年第4期348-353,共6页
In view of the fact that safety production supervision of coal mines in China features low efficacy, this paper applies principles of cybernetics to simulate the dynamic process of safety supervision, and proposes tha... In view of the fact that safety production supervision of coal mines in China features low efficacy, this paper applies principles of cybernetics to simulate the dynamic process of safety supervision, and proposes that institutional variables be controlled to support intermediate goals, which in turn contribute to the ultimate safety production objective. Rather than focusing all attention on safety issues of working faces, supervising departments of coalmines are advised to pay much more attention to institutional factors that may impact people’s attitude and behavior, which are responsible for most coalmine accidents. It is believed that such a shift of attention can effectively reduce coalmining production accidents and greatly enhance supervision efficacy. 展开更多
关键词 supervision mode control model supervision efficacy conducting mechanism
在线阅读 下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
5
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部