排序方式: 共有6条查询结果,搜索用时 93 毫秒
1
1.
骆岩红 《西北民族学院学报》2008,29(4)
文章对ParlayAPIs协议和SIP协议中与呼叫相关的部分作了对比,首先提出两者与呼叫相关的核心概念的映射关系,列举了SIPServer工作在两种常用模式下的具体概念映射模型.随后阐述了ParlayCCAPI与SIP消息之间的映射,并给出实例加以说明.对二者的地址映射问题也给出了一个基于SIP的ParlayCCAPI构建基本会话的时序关系. 相似文献
2.
医药物质在环境中的归趋和对生态环境的潜在影响已成为国际上研究的热点。本文测定了阿司匹林、盐酸环丙沙星和阿奇霉素3种常见活性医药成分(APIs)对发光菌的单一毒性以及二元和三元混合体系的联合毒性,并应用毒性单位法(TU)、相加指数法(AI)和混合毒性指数(MTI)等方法对混合体系联合作用类型进行分析。结果表明,除阿司匹林-环丙沙星二元混合体系为部分相加作用外,其它体系联合毒性均呈现为不同程度的拮抗作用。联合毒性作用类型揭示了环境中不同APIs之间相互作用,表明了医药品环境残留可能增加生物对医药物质耐药性的风险 相似文献
3.
The trusted platform module (TPM), a system component implemented on physical resources, is designed to enable computers to achieve a higher level of security than the security level that it is possible to achieve by software alone. For this reason, the TPM provides a way to store cryptographic keys and other sensitive data in its memory, which is shielded from access by any entity other than the TPM. Users who want to use those keys and data to achieve some security goals are restricted to interact with the TPM through its APIs defined in the TPM speci- fication. Therefore, whether the TPM can provide Pro- tected Capabilities it claimed depends to a large extent on the security of its APIs. In this paper, we devise a formal model, which is accessible to a fully mechanized analysis, for the key management APIs in the TPM2.0 specification. We identify and formalize security properties of these APIs in our model and then successfully use the automated prover Tamarin to obtain the first mechanized analysis of them. The analysis shows that the key management subset of TPM APIs preserves the secrecy of non-duplicable keys for unbounded numbers of fresh keys and handles. The analysis also reports that the key duplication mechanism, used to duplicate a key between two hierarchies, is vul- nerable to impersonation attacks, which enable an adver- sary to recover the duplicated key of the originating hierarchy or import his own key into the destination hier- archy. Aiming at avoiding these vulnerabilities, we proposean approach, which restricts the originating and destination TPMs to authenticate each other' s identity during duplication. Then we formally demonstrate that our approach maintains the secrecy of duplicable keys when they are duplicated. 相似文献
4.
近红外光谱结合第一范围标定法鉴定化学降糖原料药 总被引:1,自引:0,他引:1
以建立一种快速、准确、无需样品预处理的鉴定8种降糖原料药(固态和液态)的近红外分析方法为目标,分别取64个不同批次的样品为校正集,另取32个样品用于定性模型的验证,使用一阶导数进行光谱预处理,结合第一范围标定法,在12 072.3~4 000.0cm-1,建立了NIR 8种降糖原料药固态定性分析模型,结果显示每种原料药均可被成功鉴定,无一错判.说明所建立的模型可对8种降糖原料药进行快速准确的定性分析,适用于制药企业对降糖原料药进货验收和投料前的品种鉴别. 相似文献
5.
6.
1