Resource Type

Journal Article 326

Conference Videos 27

Year

2023 35

2022 41

2021 43

2020 28

2019 23

2018 19

2017 29

2016 34

2015 22

2014 9

2013 7

2012 6

2011 5

2010 6

2009 6

2008 6

2007 6

2006 4

2005 3

2004 5

open ︾

Keywords

food security 39

energy security 19

China 7

sustainable development 7

development strategy 6

cyberspace security 5

security 5

Physical layer security 4

water security 4

Network security 3

Security 3

industrial Internet security 3

Artificial intelligence (AI) 2

Block cipher 2

GIS 2

Provable security 2

Quality of service 2

Software-defined networking (SDN) 2

carbonation 2

open ︾

Search scope:

排序: Display mode:

Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures

He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun

Strategic Study of CAE 2017, Volume 19, Issue 6,   Pages 44-51 doi: 10.15302/J-SSCAE-2017.06.007

Abstract: Based on these analyses, countermeasures guaranteeing the long-life security of underwater tunnel structuresThese countermeasures are being sought to effectively protect and ensure the service performance of theThese security measures can ensure the safe performance of the structure during its entire life cycle, even under long service times.This research can serve as a reference for enhancing the structural security of underwater tunnels and

Keywords: underwater tunnels     service security     security guarantee countermeasures     long life     structural defects    

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010

Abstract:

Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whileThe path for improving the basic capabilities of the industrial Internet security public service is proposedFinally, the development of the industrial Internet security public service is prospected from the aspectsof intelligent security service, integrated public service platform, and new generation information

Keywords: industrial Internet security     security-related public service     cybersecurity     industrial informationsecurity     innovative development    

Preserving privacy information flowsecurity in composite service evolution None

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5,   Pages 626-638 doi: 10.1631/FITEE.1700359

Abstract: After a composite service is deployed, user privacy requirements and trust levels of component servicesWhen the changes occur, it is critical to preserve privacy information flow security.We propose an approach to preserve privacy information flow security in composite service evolution.item dependency graph, and the security scope of each component service is calculated.Finally, the evolution operations that preserve privacy information flow security are defined.

Keywords: Composite service     Privacy information flow security     Service evolution     Petri net    

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Strategic Study of CAE 2009, Volume 11, Issue 8,   Pages 72-78

Abstract:

As web service is taken up to develop distributed simulation system increasingly

Keywords: Web service security     double access control     distributed simulation system    

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security.security review or cyberspace management.review, and analyzes governments’ practices in the aspects of information technology product and servicesecurity evaluation, critical information infrastructure security evaluation and management, informationand communication technology (ICT) supply chain security, and background security investigation.

Keywords: cybersecurity review     information technology product and service     critical information infrastructure     supply chain security     background security    

Information sharing and performance of service supply chain

Yang Shanlin,Cheng Fei,Yang Changhui

Strategic Study of CAE 2011, Volume 13, Issue 8,   Pages 80-86

Abstract:

The service supply chain consisting of one service vendor (SV) and oneservice integrator (SI) was studied.The service vendor supplies original service productions or activities to the SI that in turn sells thevalue-add integration service to customers.In this paper, we developed information sharing and performance of service supply chain between SV and

Keywords: service supply chain     service vendor     service integrator     information sharing     coordination    

Development of geographic information system and developi nggeographic information system

Wang Jiayao

Strategic Study of CAE 2009, Volume 11, Issue 2,   Pages 10-16

Abstract: considered that the idea of Open GIS and Com GIS , which were distributed , was more fit for both data serviceand functional service under Web( Grid) environment , and put forward that GIS was developing into Open

Keywords: GIS     architecture     develop model     Web service     Grid service    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Service-oriented manufacturing: A literature review and future research directions

Frontiers of Engineering Management 2022, Volume 9, Issue 1,   Pages 71-88 doi: 10.1007/s42524-021-0171-3

Abstract: This study presents a systematic review of the literature on service-oriented manufacturing (SOM).

Keywords: service-oriented manufacturing     product– service systems     servitization     servicing     operations mana-    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014

Abstract: protocol support, integrated control of network, storage, and computing, intelligent arrangement of servicefunctions, and endogenous security structure, as well as demonstration applications in the smart park

Keywords: technology     diversified protocol     integration of network     storage     and computing     intelligent arrangement of servicefunctions     endogenous security    

Towards a self-adaptive service-oriented methodology based on extended SOMA

Alireza PARVIZI-MOSAED,Shahrouz MOAVEN,Jafar HABIBI,Ghazaleh BEIGI,Mahdieh NASER-SHARIAT

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1,   Pages 43-69 doi: 10.1631/FITEE.1400040

Abstract: The proposed process can be plugged into various software development processes and service-orientedTo this aim, the proposed SAP is integrated with the service-oriented modeling and application (SOMA)methodology in a two-layered structure to create a novel methodology, named self-adaptive service-oriented

Keywords: Quality attribute     Adaptation pattern     Architectural tactic     Service-oriented architecture     Self-adaptive    

Service life prediction of fly ash concrete using an artificial neural network

Frontiers of Structural and Civil Engineering 2021, Volume 15, Issue 3,   Pages 793-805 doi: 10.1007/s11709-021-0717-9

Abstract: Once reinforcement is altered by carbonation, the structure will no longer fulfill service requirementsFinally, a mathematical formula is proposed that can be used to successfully estimate the service life

Keywords: concrete     fly ash     carbonation     neural networks     experimental validation     service life    

Bridging reliability and operations management for superior system availability: Challenges and opportunities

Frontiers of Engineering Management   Pages 391-405 doi: 10.1007/s42524-022-0206-4

Abstract: manufacturing, and maintenance of capital goods through a consolidated mechanism called the integrated product-service

Keywords: system availability     product-service integration     installed base     new product introduction     service supply    

Blockchain application in healthcare service mode based on Health Data Bank

Jianxia GONG, Lindu ZHAO

Frontiers of Engineering Management 2020, Volume 7, Issue 4,   Pages 605-614 doi: 10.1007/s42524-020-0138-9

Abstract: To guarantee data privacy and data security as well as to harness the value of health data, the conceptIn this study, HDB is defined as an integrated health data service institution, which bears no “ownershipapplication scenarios including distributed storage of health data, smart-contract-based healthcare service, and consensus-algorithm-based incentive policy are proposed to shed light on HDB-based healthcare service

Keywords: Health Data Bank     blockchain     data assets     smart contract     incentive mechanism    

Title Author Date Type Operation

Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures

He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun

Journal Article

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Journal Article

Preserving privacy information flowsecurity in composite service evolution

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Journal Article

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Journal Article

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

Information sharing and performance of service supply chain

Yang Shanlin,Cheng Fei,Yang Changhui

Journal Article

Development of geographic information system and developi nggeographic information system

Wang Jiayao

Journal Article

Soil security and global food security

Journal Article

Service-oriented manufacturing: A literature review and future research directions

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Journal Article

Towards a self-adaptive service-oriented methodology based on extended SOMA

Alireza PARVIZI-MOSAED,Shahrouz MOAVEN,Jafar HABIBI,Ghazaleh BEIGI,Mahdieh NASER-SHARIAT

Journal Article

Service life prediction of fly ash concrete using an artificial neural network

Journal Article

Bridging reliability and operations management for superior system availability: Challenges and opportunities

Journal Article

Blockchain application in healthcare service mode based on Health Data Bank

Jianxia GONG, Lindu ZHAO

Journal Article