首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 265 毫秒
1.
通过校园网安全的需求分析,基于NS2构建了一个将PKI技术植入VPN的网络安全网络架构模型,并进行了实验论证,结果发现在不更换原有数据库系统、应用软件的条件下能够有效地提高校园网的安全性,降低校园网络被DDoS攻击的可能性,同时网络的稳定性也得到了提高.  相似文献   

2.
随着信息时代的不断发展,校园网络的安全问题越来越重要,PKI技术在网络安全方面深受用户的认可,将CA(权威认证中心)应用于校园网身份认证系统中,能够为确保校园网络的安全性和可用性提供更好的支持。  相似文献   

3.
钱乐旦 《福建电脑》2008,24(5):99-100
VPN目前是校园网安全建设的基础与核心。校园网中应用VI,N不仅解决多校区的低成本的互联又能为移动OA提供方便的校园网连接。但VPN在使用中仍然存在着许多安全问题,而PKI技术可以为校园网的应用提供加密和数字签名等安全服务,所以校园网VPN可以通过借助PKI来增强它的安全性。本文首先简述VPN和PKI安全技术,而后着重分析如何在校园网VPN中应用PKI技术。  相似文献   

4.
基于PKI/CA技术的身份认证体系不但使身份认证更为安全和可靠,而且对用户操作具有不可否定性。借助PKI技术和数字证书建立符合高校校园网实际情况的统一身份认证系统,目的是解决在不同的网络应用系统下身份认证不统一的问题,从而更加保障了校园网系统运行的安全性和可靠性。  相似文献   

5.
随着我国教育信息化的不断开展与深入,校园网络在高职院校中的应用地位也愈来愈重要。本文就PKI技术植入VPN技术获得安全性更高的校园网络模型进行了深入研究和分析,以便确保高职校园网络能够更加安全使用。  相似文献   

6.
唐洁  ;张月琳 《微机发展》2008,(8):159-162
要保证网络应用的数据真实性、保密性、完整性和不可否认性,PKI是一种行之有效的方法。在对数字化校园发展现状分析的基础上,研究了PKI在数字化校园建设中的作用,并利用OpenCA以及OpenSSL等工具,构建一个适合校园网的PKI,为相关网络应用提供加密和数字证书等服务,不但解决了网络传输的安全问题,还能将其应用到电子邮件、电子公章及校园网络交易平台中,对目前大学数字化校园建设具有一定的参考价值。  相似文献   

7.
PKI研究以及在数字化校园中的应用   总被引:1,自引:0,他引:1  
要保证网络应用的数据真实性、保密性、完整性和不可否认性,PKI是一种行之有效的方法.在对数字化校园发展现状分析的基础上,研究了PKI在数字化校园建设中的作用,并利用OpenCA以及OpenSSL等工具,构建一个适合校园网的PKI,为相关网络应用提供加密和数字证书等服务,不但解决了网络传输的安全问题,还能将其应用到电子邮件、电子公章及校园网络交易平台中,对目前大学数字化校园建设具有一定的参考价值.  相似文献   

8.
随着校园网络的发展和信息交流的增长,各种信息存储和安全问题日益凸现。公开密钥基础设施(PKI)是互联网安全的一种关键技术,也是目前公认的解决大型开放网络环境下信息安全问题最可行、是有效的办法。本文对PKI概念、组成进行了阐述,并提出了一个校园网PKI系统模型的设计。  相似文献   

9.
伴随网络技术的普及,越来越多的校园学生通过Internet获取信息,网络已经成为学生学习、交流以及获取知识的一个重要的平台。为适应学生发展的需要,学校势必会构建相应的校园网络,校园网络是面向大众的一个平台,同样它也会遭受来自非法入侵者的攻击,相关的数据可能就会被泄露或者更改,那么这就对整个校园网的安全造成了相对严重的后果,因此提高校园网络的安全性,保证校园网络数据的完整性、安全性、可控性、保密性以及可用性对整个校园网络来说十分重要。本文首先介绍了校园网基本网络结构的搭建,然后分析了校园网络安全设计。  相似文献   

10.
随着计算机网络技术的发展和应用,各大中专院校实现了管理网络化、教学手段现代化和信息资源共享,然而随着校园网规模的壮大和运用水平的提高使得校园网面临的隐患也相应加剧,因此,怎样确保校园网络系统的安全性和鲁棒性是校园网络管理者急需解决的重要课题。文章从当前校园网络存在的安全隐患入手,提出了校园网络安全解决策略,最后对常用的网络安全防范技术进行探讨。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号