首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
网络支付协议的形式化安全需求及验证逻辑   总被引:2,自引:0,他引:2  
刘怡文  李伟琴 《通信学报》2004,25(4):174-182
从整个网络支付协议的安全角度出发,提出网络支付协议的多层安全需求模型,包括以认证和密钥分配为基础的基层需求、网络支付协议固有的中层需求(包括保密性、原子性、公平性、完整性、匿名性、不可否认性、可追究性等)、以及面向具体应用的高层需求。基于一阶逻辑和时序逻辑,提出一种适合描述网络支付协议的形式化安全需求的逻辑,描述了该逻辑的语法结构和推理规则,并用该安全需求逻辑对网络支付协议的多层安全需求进行了形式化描述。最后,以SET协议为例进行需求验证。  相似文献   

2.
3.
《信息技术》2015,(9):169-173
文中旨在将用户提出的问题合理分配给专家。首先提出一种基于主题建模的问题推荐方法,以概率潜在语义分析技术分析知识社区中专家的兴趣分布,结合专家已回答的问题与用户问题之间的相似度,获得备选相关领域专家集。再通过构建专家问答关系链接图,综合衡量相关领域专家的权威度与相关领域专家已回答的问题及其答案的匹配度,最终获得最优专家集,实现用户问题的合理分配。  相似文献   

4.
Ubiquitous smart devices with embedded sensors are paving the way for mobile ad hoc networks (MANETs) that enable users to communicate directly, thereby playing a key role in Smart City and Internet of Things applications. In such smart environments, people with smart devices (nodes) can freely self-organize and form self-configuring MANETs to send and forward data packets to a destination over multiple hops via intermediate nodes. However, the energy consumption during routing remains a challenge in such ensemble mobile environments due to the limited battery capacity of mobile devices. This challenging issue has received substantial research attention, necessitating an exhaustive literature search over the variety of academic fields addressing this topic. The main motivation of this paper is to review various power-efficient routing schemes in MANETs that have recently been proposed to reduce the energy consumed when transmitting and receiving packets during active communication. Accordingly, these protocols are classified into six categories: (1) link state-based, (2) source-initiated-based, (3) transmission power control-based, (4) load-balancing-based, (5) location-based and (6) multicast-based routing approaches. The review covers various state-of-the-art protocols for each category and highlights their operation concepts, design challenges and key features. In addition, the various protocols are compared with emphasis on the merits and drawbacks as well as the considered metrics of each scheme. Finally, we provide a conclusion and suggest potential directions for future research in the field.  相似文献   

5.
Due to the scaling down, the contribution of interconnects should become preponderant for the performance of IC. The use of low-k dielectrics and/or low resistivity metals in order to decrease the parasitic capacitance of interconnect is a technological requirement. Especially the use of copper, with mineral dielectric as IMD, instead of aluminium alloy is now commonly accepted. In this paper we compare the intrinsic performance of two damascene architectures. The planarization by metal CMP, which will determine the final metal thickness, may induce killer defects (shorts between lines) or degraded metal sheet resistance uniformity for multi-level metallization devices. The impact on electromigration of the damascene structure is presented: due to the reverse architecture, the grain sizes and orientations are found to be linewidth dependent. On the other hand, the life times extrapolated with different copper and barrier deposition processes vary on a large range: from similar to those obtained with aluminium for a full CVD metallization (barrier+copper) to more than one order of magnitude higher for a CVD barrier and a mixed CVD+PVD copper deposition.  相似文献   

6.
《现代电子技术》2016,(17):112-115
设计并实现了中文领域术语抽取系统,提出了基于前后缀的中文领域术语抽取算法,该算法独立于具体的领域,并且对包含常用前后缀的领域术语具有较好的抽取效果;通过对领域本体构建中关键技术的研究,提出了适用于不同领域的领域本体半自动构建方法;最后,数字图书馆气候变化领域本体的成功构建验证了基于多源数据的领域本体半自动构建方法的有效性,并且该方法可以很方便地移植到其他领域。  相似文献   

7.
8.
9.
This paper describes a methodology developed at the Jet Propulsion Laboratory (JPL), and designed for the process of requirements engineering and management. MY-STAR provides techniques for specifying, refining, allocating, baselining, sharing, changing, storing and reporting on requirements and requirements metrics. In support of MY-STAR, the tool STAFR (System for Tracing and Analyzing Functional Requirements) has been prototyped by the Ground Systems Group (Software Product Assurance) as part of process assurance support to four different projects within the Deep Space Network (DSN) at JPL. The results show that STAFR provides an effective means for capturing in one place requirements, while enabling refinement, analysis, traceability of test cases to requirements, and other trade-off artifacts associated with the specifications, prioritization, allocation and planning of requirements. It does so without the significant overhead typically associated with knowledge-based systems.  相似文献   

10.
Telecommunication Systems - The future wireless Fifth Generation (5G) communication network required a higher bandwidth in order to achieve greater data rate. It will be largely characterized by...  相似文献   

11.
12.
The ISDN (integrated services digital network) is characterized by the breadth of services to be supplied and the complexity of the protocols involved. Moreover, the ISDN services evolvability is an essential requirement which must be taken into account by telecommunication systems schedule. An approach to improving the quality of telecommunication products is described that is based on a formalization of communication functions. The compilation of the specifications provides a means of validation and allows the generation of an implementation and of qualification tests. This process is illustrated by an example of its use on an Alcatel E10 system component  相似文献   

13.
Because of the scope and inter-disciplinary nature of the subject, reliability education provides special problems. The kinds of tasks and therefore the training needs of reliability staff are highly dependent on the role of the organization in the equipment life cycle and to a lesser degree, the nature of the product. Correctable short-comings in available reliabiliy education include lack of instruction in environmental engineering, parts control, documentation. Program management and personal communication techniques are also recommended.  相似文献   

14.
In recent years, data centers play an important role in academia and industry for supporting various services and applications. Compared with other IP networks, data center networks have some special features such as many-to-one communication pattern with high bandwidth, low latency, auto-scaling, shallow buffered switches and multi-rooted tree topology. Owing to these special features of data center networks, traditional TCP suffers from severe performance degradation. For improving the performance of TCP in data center networks, various solutions have been proposed in recent years. This article presents a comprehensive survey of existing transport layer solutions proposed for mitigating the problems of TCP in data center networks. The objective of this article is threefold: to discuss about the issues of TCP in data center networks; to introduce various transport layer solutions and finally to compare and discuss the challenges of existing solutions proposed for improving the performance of TCP in data center networks.  相似文献   

15.
Peer to peer (P2P) networks offer higher robustness against failure, easier configuration and are generally more economical as compared to their client-server counterparts. This has made it reasonable for resource consuming and typically centralized applications like Voice over IP (VoIP) and, in general, real-time communication to adapt and exploit the benefits of P2P. Such a migration needs to address a new set of P2P specific security problems. We go over some of the known issues found in common P2P networks. We then analyze the relevance of such issues and the applicability of existing solutions when using P2P architectures for real-time communication.  相似文献   

16.
17.
Security issues and solutions in multicast content distribution: a survey   总被引:1,自引:0,他引:1  
Judge  P. Ammar  M. 《IEEE network》2003,17(1):30-36
Multicast enables efficient large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communication. The very properties that make multicast attractive, however, also make it a challenging environment in which to provide content security. We show how the fundamental properties of the multicast paradigm cause security issues and vulnerabilities. We focus on four areas of research in security for multicast content distribution: receiver access control, group key management, multicast source authentication, and multicast fingerprinting. For each we explain the vulnerabilities, discuss the objectives of solutions, and survey work in the area. Also, we briefly highlight other security issues in multicast content distribution including source access control, secure multicast routing, and group policy specification. We then outline several future research directions.  相似文献   

18.
19.
Understanding data-modeling performance can provide valuable lessons for the selection, training, research, and development of data models. Data modeling is the process of transforming expressions in loose natural language communications into formal diagrammatic or tabular expressions. While researchers generally agree that abstraction levels can be used to explain general performance differences across models, empirical studies have reported many construct level results that cannot be explained. To explore further explanations, we develop a set of model-specific construct complexity values based on both theoretical and empirical support from complexity research in databases and other areas. We find that abstraction levels and complexity values together are capable of providing a consistent explanation of laboratory experiment data. In our experiment, data were drawn from three models: the relational model, the extended-entity-relationship model, and the object-oriented model. With the newly developed complexity measures, a consistent explanation can be made for findings from other studies which provide sufficient model details for complexity values to be calculated.  相似文献   

20.
The issue of security, which is considered to be the final hurdle to be overcome in achieving interoperability of US Army computer systems, is discussed. In particular, the problem of transferring data across security boundaries is examined. The primary concern is to defend against unauthorized disclosure of high-side (e.g. top secret) data to low-side (e.g. secret) users. This might be caused by high-side errors, by malicious high-side software, or by active penetration from the low side. Other concerns include defending against modification or destruction of high-side data as well as denial of service to high-side users. Typical current solutions are described. The use of a security guard (also known as a security filter), i.e. a device or set of controls that mediates data transfers across security boundaries, to prevent leakage and penetration is examined. Lessons from past failures with guards and experience with an operational guard are discussed. Although military applications are addressed, the security issues raised are also thought to apply in the commercial sector  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号