The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Bell-LaPadula model is able to provide excellent protection for confidentiality, but is short of integrity policy. Moreover, its trusted subjects are endowed too much privilege to be conformed with the principle of least privilege. In order to resolve these problems, a new hybrid model called CIUSM is proposed, which takes Bell-LaPadula as the initial model. CIUSM organically absorbs ideas of well-formed...
In typical IP network, load balancing is adopt to enable the load of all servers approach a global optimal balanced by dynamically dispatching new flows to different servers in the network. Linux Virtual Server (LVS) plays an important role in the dispatching process. However, previous LVS-based researches have failed to consider expansibility, efficiency and security. Based on this, we proposed a...
There are several problems exist in the field of Chinese food safety at present: food safety system and command system of crisis management is imperfect. This thesis analyzes the reason that led to the malfunction and inefficient status of food safety crisis management of China. It mainly focusing on problems of overlapping functions; overstaffing; stagnant information changing; inadequate legal protection;...
Several serious fire and explosion accidents occurred in Chinese oil depots in recent years, thus an increasing number of people pay attention to its security work. Fire safety assessment acting as a measurement to the security of an oil depot becomes more and more important to the modern management. This paper describes several methods of fire safety assessment at home and abroad, and then proposes...
An operation mode called hybrid sliding pressure operation mode, which considered the valve point and operation load together, was proposed in this paper based on the analysis and study of a large number of unit operation optimization methods. In addition, according to the steam-excited vibration occurred during the optimization process when the nozzle governing steam turbine switch single valve to...
In this paper, the cost - quality -time - security model is lead into the projects innovatively; we describe the basic principle of the particle swarm optimization method, and introduce the integer programming as well as the structure of multi-attribute utility function. The discussion on the cost optimization in the construction phase of a substation have confirmed that the PSO method can determine...
In this paper we re-examine the attacking scenario about wireless sensor networks. It is generally assumed that the adversary picks up all radio communications of sensor nodes without any loss and stores the eavesdropped messages for later use. We suggest that in some situations the adversary may not be able to pick up all radio communications of sensor nodes. Therefore, we propose the storage-bounded...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.