Applied Mechanics and Materials Vols. 263-266

Paper Title Page

Abstract: Traditional IP multicast had poor scalability. Larger the number of groups was, more forwarding states were stored, which meant more memory overhead and slower forwarding process. To solve the problem, a reconfigurable aggregated multicast scheme was proposed. This scheme provided a unified service for multiple multicast groups based on QoS categories and tree similarity. It could also be reconfigured with QoS requirements and multicast groups change. Results show that the scheme can achieve more forwarding state reduction compared with conventional aggregated scheme under certain bandwidth waste threshold or the number of groups.
3120
Abstract: The rapid development of internet of things puts forward urgent needs for security. The security system must be studied to adapt to the characteristics of the internet of things. The micro- certificate based security system for internet of things takes full account of the security characteristics of things, and uses the symmetric cryptographic algorithms and security chip technology. This security system can meet the security requirements for large-scale sensor’s authentication, signification and encryption/decryption in internet of things, and improve the security performance of internet of things greatly.
3125
Abstract: Based upon the resume of information system security, this paper sets forth security system of information system and the related system security technologies, such as network security technology, mainframe security technology, application security technology, database security technology, cipher security technology and environment security technology, and analyzes the security technology evolution of the information system.
3130
Abstract: The transport information security provided by vehicles under VANET environment is quite important. The advantages of the method proposed in the essay are as follows: 1. Communication equipments could validate the information mutually through IBC; 2. Vehicles could validate the legality of public/private key. 3. Vehicles need not show any certificates to validate the identity, so as to avoid the certificates from attacking owing to long-term exposure; 4. The vehicle information could be validated through chameleon method, without waiting for RSU to validate the information, which could improve the instantaneity of the information; 5. The vehicles need not revalidate the identities and consult common key during the time of Hand-off within different RSU ranges.
3135
Abstract: This paper summarizes the development of electronic records management, and due to current defects and shortcomings, discusses the more effective and reasonable information security management program. For the system security issues, the paper has done an overall security analysis of system from the application layer, network layer, and database layer to physical and management levels, and has made a system’s security strategy.
3141
Abstract: Building a trust mechanism for Web service is very important. First, Bayes method is used to evaluate the interaction success probability of Web service; then direct trust value, indirect trust value, reputation value and total trust value are defined respectively; third, the sample size determination is discussed; finally, the simulation experiment results demonstrate its feasibility and effectiveness.
3151
Abstract: Data exchange is one of the material bottlenecks in information construction. Many data exchange methods have been proposed to improve application interoperability. However, how to reliably provide numerous exchanges of data is a new challenge. In this paper, we design a new file format, aim to solve the above problem. The format ESFT not only guarantees the safety performance, but also dynamically generates ESFT label to record exchange historical information.
3155
Abstract: Total reliability, also called the average redundant observation component, is an indicator of a survey network. It summarily shows whether gross errors contained in observations on a survey network may be eliminated or weakened by robust estimation methods. Based on total reliability, the current paper presented the concept of remainder reliability, which essentially showed whether gross errors might be eliminated or weakened by robust estimation. Taking 12 leveling networks with different remainder reliability adjustments as examples, simulation experiments were used to compare 4 frequently used robust estimation methods. The results indicate that when observations simultaneously contain one gross error and if the remainder reliability RRg≥0.30 , robust estimation methods may eliminate or weaken these effects. However, if RRg>0.40, all the four robust estimation methods may effectively eliminate or weaken these effects.
3163
Abstract: With the increasing number of attacks against industrial control systems, functions security issues of the smart grid industrial control system gradually become the focus of research in the field of smart grid. This paper introduced smart grid industrial control systems threats which faced and incidents firstly, and analyzed the current situation of the functional safety certification, including certification bodies, certification tools and certification classes; Then, researched the smart grid industrial control system functional safety certification, gave the content of the smart grid industrial control system functional safety certification, and made the design of its hardware evaluation process; Finally, we discuss the research status of functional safety certification, and pointed out the problems that the smart grid industrial control system functional safety faces.
3168

Showing 601 to 610 of 680 Paper Titles