首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
综合类   7篇
  2009年   1篇
  2008年   3篇
  2003年   1篇
  2002年   2篇
排序方式: 共有7条查询结果,搜索用时 171 毫秒
1
1.
In order to integrate heterogeneous location-aware systems into pervasive computing environment,a novel pervasive computing location-aware model based on ontology is presented.A location-aware model ontology(LMO)is constructed.The location-aware model has the capabilities of sharing knowledge,reasoning and adjusting the usage policies of services dynamically through a unified semantic location manner.At last,the work process of our proposed location-aware model is explained by an application scenario.  相似文献   
2.
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bidirectional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.  相似文献   
3.
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.  相似文献   
4.
为了给安徽省工商局各业务部门提供一套较高标准的管理信息系统,作在经过充分调研的基础上,在有关部门的配合下,利用PowerBuilder作为主要前台开发工具、Sybase为后台数据库、Windows NT/2000 Server为支撑数据库的系统平台、借助于互连网信息服务Internet Information Server、客户端系统Windows 95/98/NT Workstation/2000、客户端浏览软件Internet Explorer或Netseape等研制而成该市场主体管理信息系统.介绍了该系统的总体设计思想及其功能组成,指出了其对原有相关系统的改进之处,叙述了其实现方法及应用效果.  相似文献   
5.
介绍了远程访问服务器(Remote Access Server)的系统组成,阐述了用Cisco路由器作为远程访问服务器而构建广域网系统的基本方法.从关于Modem的配置,关于服务的配置,关于协议的配置以及关于安全性问题4个方面来讨论Cisco路由器的RAS配置.  相似文献   
6.
安徽省普通高校招生计算机辅助录取系统的设计与实现   总被引:6,自引:1,他引:5  
本文介绍了计算机辅助录取系统的总体设计思想,阐述了系统的模块划分及功能实现,并对系统的几个关键模块进行了分析.  相似文献   
7.
Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable se...  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号