期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
基于高程信息的卫星访问计算方法 被引量:3
1
作者 赵汝哲 林元 +2 位作者 彭会湘 员建厦 张万玉 《无线电工程》 2017年第12期67-70,74,共5页
成像卫星任务规划的基础是访问分析,而其核心是计算卫星对目标的访问信息,即卫星对目标的观测时间和观测姿态角度。现有卫星任务管控系统中使用的卫星访问信息计算方法通常没有考虑目标高程信息,这使得对高海拔地区目标的观测姿态角度... 成像卫星任务规划的基础是访问分析,而其核心是计算卫星对目标的访问信息,即卫星对目标的观测时间和观测姿态角度。现有卫星任务管控系统中使用的卫星访问信息计算方法通常没有考虑目标高程信息,这使得对高海拔地区目标的观测姿态角度计算不够准确。提出一种基于目标高程信息改进的卫星访问信息计算方法,在构建卫星与目标的空间计算模型时,考虑目标的高程信息,计算得出更为准确的观测姿态角度,使得按此角度做规划后的卫星能够精确地拍摄到目标位置。实验结果表明,该算法降低了系统误差,提高了卫星观测精度。 展开更多
关键词 成像卫星 对地观测 访问计算 高程信息
在线阅读 下载PDF
基于双层并行架构的高速目标访问计算技术 被引量:1
2
作者 杨纪伟 赵汝哲 +4 位作者 张学亮 彭会湘 白晶 颜博 岳群彬 《无线电工程》 2020年第11期944-950,共7页
目标访问计算技术旨在计算卫星对目标的访问时刻及对应姿态,是观测卫星管控领域重要的基础技术。目标访问计算速度直接影响卫星管控的时效性,对多星多目标筹划实时性影响较大。面向多星多目标筹划任务,提出了双层并行架构的高速目标访... 目标访问计算技术旨在计算卫星对目标的访问时刻及对应姿态,是观测卫星管控领域重要的基础技术。目标访问计算速度直接影响卫星管控的时效性,对多星多目标筹划实时性影响较大。面向多星多目标筹划任务,提出了双层并行架构的高速目标访问计算技术。该技术通过在任务级和线程级并行,提高了观测卫星目标访问计算的实时性。实验结果证明了该技术在多星多目标筹划任务中的实时性和优越性。 展开更多
关键词 访问计算 双层并行 卫星管控 卫星姿态 异构计算
在线阅读 下载PDF
基于多元关联匹配的计算机资源访问优化实现
3
作者 郭丽 肖锋 《科技通报》 北大核心 2014年第6期67-69,共3页
提出一种多元关联匹配的计算机资源访问实现方法,对所有的访问资源实现元节点的分配,在元点合理设计和规划的基础上,采用多个元点的关联性来实现系统资源的匹配,最终通过吻合判决,给出允许访问的指令;采用一组多任务的资源访问进行测试... 提出一种多元关联匹配的计算机资源访问实现方法,对所有的访问资源实现元节点的分配,在元点合理设计和规划的基础上,采用多个元点的关联性来实现系统资源的匹配,最终通过吻合判决,给出允许访问的指令;采用一组多任务的资源访问进行测试实验,结果显示,采用基于多元关联匹配的计算机资源访问实现,系统的全局效率得到极大提升,具有很好的工程应用价值。 展开更多
关键词 多元关联匹配 计算机资源访问 多任务
在线阅读 下载PDF
基于显态伪装集合监测的计算机安全访问
4
作者 彭其华 《科技通报》 北大核心 2014年第4期146-148,共3页
计算机访问数据的安全性是保障计算机数据正常访问的最重要基础。提出一种基于显态伪装集合监测的计算机安全访问实现方法,首先将计算机访问数据分为显态数据和伪态数据,通过识别访问数据的深层次特征,对伪装下的计算机数据集合进行融... 计算机访问数据的安全性是保障计算机数据正常访问的最重要基础。提出一种基于显态伪装集合监测的计算机安全访问实现方法,首先将计算机访问数据分为显态数据和伪态数据,通过识别访问数据的深层次特征,对伪装下的计算机数据集合进行融合分析,识别高伪装的攻击数据。最后采用4种攻击数据进行测试,结果显示,采用基于显态伪装集合监测的计算机安全访问实现方法,高度伪装的访问数据能够被很好的识别出并拦截,具有很好的应用价值。 展开更多
关键词 显态伪装集合 计算机安全访问 高伪装入侵
在线阅读 下载PDF
STK在卫星地面应用系统中的应用 被引量:3
5
作者 谷宏志 《无线电通信技术》 2007年第3期56-58,共3页
介绍了STK软件的主要功能及其在航天工程领域的应用。在介绍该软件功能和特性的基础上,分析了在卫星地面应用系统的建设中地面接收站选址对系统效能的影响,以及在系统运行管理中控制卫星传感器进行目标探测时的访问计算问题,结合具体应... 介绍了STK软件的主要功能及其在航天工程领域的应用。在介绍该软件功能和特性的基础上,分析了在卫星地面应用系统的建设中地面接收站选址对系统效能的影响,以及在系统运行管理中控制卫星传感器进行目标探测时的访问计算问题,结合具体应用提出了利用STK工具软件分析和解决问题的方法。 展开更多
关键词 卫星工具包 地面应用系统 覆盖分析 访问计算
在线阅读 下载PDF
利用远程桌面实现家庭办公 被引量:1
6
作者 王慨 《南通职业大学学报》 2003年第3期55-57,共3页
随着上网费用的降低 ,通过WindowsXPProfessional的远程桌面和因特网 ,人们可以越过企业内部网络的防火墙 ,实现在家办公。但这就对网络安全有了更高的要求。因此为了保证内联网的安全应该采取一些必要的措施 ,如给远程用户设置强密码... 随着上网费用的降低 ,通过WindowsXPProfessional的远程桌面和因特网 ,人们可以越过企业内部网络的防火墙 ,实现在家办公。但这就对网络安全有了更高的要求。因此为了保证内联网的安全应该采取一些必要的措施 ,如给远程用户设置强密码并限制其权限等等。 展开更多
关键词 Windows-XP-Professional 家庭办公 计算访问 远程访问 远程“桌面” 网络安全
在线阅读 下载PDF
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
7
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
在线阅读 下载PDF
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing 被引量:3
8
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第4期50-63,共14页
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in... In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient. 展开更多
关键词 digital rights management cloud computing usage control attribute-based encryption homomorphic encryption
在线阅读 下载PDF
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:16
9
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 cloud computing attribute-basedencryption access control multi-authority constant ciphertext length attribute revocation
在线阅读 下载PDF
Towards Efficient and Secure Access Control System for Mobile Cloud Computing 被引量:6
10
作者 TU Shanshan HUANG Yongfeng 《China Communications》 SCIE CSCD 2015年第12期43-52,共10页
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ... This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud. 展开更多
关键词 cloud execution constraints partition encryption Encryption satisfying assume posed visualization
在线阅读 下载PDF
Visualization Framework for Inter-Domain Access Control Policy Integration 被引量:1
11
作者 潘理 柳宁 訾小超 《China Communications》 SCIE CSCD 2013年第3期67-75,共9页
The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- thoug... The rapid increase in resource sharing across domains in the cloud comput- ing environment makes the task of managing inter-domain access control policy integration difficult for the security administrators. Al- though a number of policy integration and sec- urity analysis mechanisms have been devel- oped, few focus on enabling the average ad- ministrator by providing an intuitive cognitive sense about the integrated policies, which considerably undermines the usability factor. In this paper we propose a visualization flame- work for inter-domain access control policy integration, which integrates Role Based Ac- cess Control (RBAC) policies on the basis of role-mapping and then visualizes the inte- grated result. The role mapping algorithm in the framework considers the hybrid role hier- archy. It can not only satisfy the security con- straints of non-cyclic inheritance and separa- tion of duty but also make visualization easier. The framework uses role-permission trees and semantic substrates to visualize the integrated policies. Through the interactive policy query visualization, the average administrator can gain an intuitive understanding of the policy integration result. 展开更多
关键词 policy visualization policy integration role based access control role mapping
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部