Resource Type

Journal Article 352

Conference Videos 27

Year

2023 35

2022 43

2021 44

2020 31

2019 24

2018 21

2017 31

2016 35

2015 24

2014 11

2013 7

2012 6

2011 5

2010 8

2009 9

2008 8

2007 7

2006 4

2005 3

2004 5

open ︾

Keywords

food security 39

energy security 19

China 7

sustainable development 7

development strategy 6

cyberspace security 5

security 5

Physical layer security 4

water security 4

Network security 3

Security 3

industrial Internet security 3

Artificial intelligence (AI) 2

Block cipher 2

GIS 2

Provable security 2

Quality of service 2

Software-defined networking (SDN) 2

carbonation 2

open ︾

Search scope:

排序: Display mode:

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Strategic Study of CAE 2009, Volume 11, Issue 8,   Pages 72-78

Abstract:

As web service is taken up to develop distributed simulation system increasingly

Keywords: Web service security     double access control     distributed simulation system    

Development of geographic information system and developi nggeographic information system

Wang Jiayao

Strategic Study of CAE 2009, Volume 11, Issue 2,   Pages 10-16

Abstract: GIS architecture and software development model caused by the development of computer communication Webconsidered that the idea of Open GIS and Com GIS , which were distributed , was more fit for both data serviceand functional service under Web( Grid) environment , and put forward that GIS was developing into OpenGIS based on Web services and Grid services .basic architecture and characteristics of sharing geographic information and data interaction based on Web

Keywords: GIS     architecture     develop model     Web service     Grid service    

Study on Data Exchange in System of Remote Monitoring Intelligent Building

Duan Jingmin, Wang Ying, Song Yongheng, Chang Hui

Strategic Study of CAE 2008, Volume 10, Issue 8,   Pages 73-75

Abstract: building control of remote control, and structed a high efficient distribuited control data exchange service

Keywords: intelligent building     data inface     distributed     web service    

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Strategic Study of CAE 2005, Volume 7, Issue 3,   Pages 74-77

Abstract:

This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure CookieThe middleware improves the efficiency of the web applications through hardware, and reduces the difficulty

Keywords: JavaBeans     Secure Cookie     middleware     PMI     RBAC    

Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures

He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun

Strategic Study of CAE 2017, Volume 19, Issue 6,   Pages 44-51 doi: 10.15302/J-SSCAE-2017.06.007

Abstract: Based on these analyses, countermeasures guaranteeing the long-life security of underwater tunnel structuresThese countermeasures are being sought to effectively protect and ensure the service performance of theThese security measures can ensure the safe performance of the structure during its entire life cycle, even under long service times.This research can serve as a reference for enhancing the structural security of underwater tunnels and

Keywords: underwater tunnels     service security     security guarantee countermeasures     long life     structural defects    

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010

Abstract:

Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whileThe path for improving the basic capabilities of the industrial Internet security public service is proposedFinally, the development of the industrial Internet security public service is prospected from the aspectsof intelligent security service, integrated public service platform, and new generation information

Keywords: industrial Internet security     security-related public service     cybersecurity     industrial informationsecurity     innovative development    

Finite element analysis and structural design of pretensioned inverted T-beams with web openings

Hock Tian CHENG, Bashar S. MOHAMMED, Kamal Nasharuddin MUSTAPHA

Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 2,   Pages 148-157 doi: 10.1007/s11709-009-0030-5

Abstract: This paper presents the results of a research project aimed at providing standard circular web openingspaper the nonlinear analysis and design of simply supported pretensioned inverted T-beam with circular webThe test results obtained from this investigation show that the performance of the specimens with webopenings is almost identical to that of the specimen without web openings.A simple design method for pretensioned inverted T-beam with circular web openings is proposed.

Keywords: prestressed concrete     inverted-T beam     web opening    

Torsional behavior of triangular web profile (TRIWP) steel section by experimental study

Fatimah DE’NAN,Hazwani HASAN,Mohd Hanim OSMAN,Sariffudin SAAD

Frontiers of Structural and Civil Engineering 2016, Volume 10, Issue 4,   Pages 409-419 doi: 10.1007/s11709-016-0358-6

Abstract: A triangular web profile (TriWP) is a modified section where the flanges are connected to a web plateThis study examined the torsional behavior of TriWP steel sections and compared to that of the flat web

Keywords: corrugated web     i-beam     non uniform steel section     torsion resistance     torsion angle     triangular web profile    

Preserving privacy information flowsecurity in composite service evolution None

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5,   Pages 626-638 doi: 10.1631/FITEE.1700359

Abstract: After a composite service is deployed, user privacy requirements and trust levels of component servicesWhen the changes occur, it is critical to preserve privacy information flow security.We propose an approach to preserve privacy information flow security in composite service evolution.item dependency graph, and the security scope of each component service is calculated.Finally, the evolution operations that preserve privacy information flow security are defined.

Keywords: Composite service     Privacy information flow security     Service evolution     Petri net    

Experimental study on shear behavior of reinforced concrete beams with web horizontal reinforcement

Dong XU,Yu ZHAO,Chao LIU

Frontiers of Structural and Civil Engineering 2014, Volume 8, Issue 4,   Pages 325-336 doi: 10.1007/s11709-014-0080-1

Abstract: reinforced concrete beams, current codes do not provide any calculation method to evaluate the influence of webpaper comprises results of 11 reinforced concrete beams in an effort to investigate the influence of webprimary design variables are the shear-span-depth ratio, different reinforcement ratio of stirrups and webInfluence of web horizontal reinforcement on crack patterns and failure mode was studied.It was found that web horizontal reinforcement can increase the shear capacity of the beams and restrain

Keywords: reinforced concrete beam     shear strength     web horizontal reinforcement     experiments    

Robust optimization of the billet for isothermal local loading transitional region of a Ti-alloy rib-web

Ke WEI, Xiaoguang FAN, Mei ZHAN, Miao MENG

Frontiers of Mechanical Engineering 2018, Volume 13, Issue 3,   Pages 376-384 doi: 10.1007/s11465-018-0500-3

Abstract: the transitional region in the isothermal local loading forming (ILLF) of large-scale Ti-alloy rib-web

Keywords: isothermal local loading forming     rib-web component     transitional region     robust optimization     dual response    

The Secondary Web of Knowledge Embodiment

Li Youping

Strategic Study of CAE 2002, Volume 4, Issue 8,   Pages 8-11

Abstract:

World wide web (WWW) has become a primary web across the Internet, which has been widely acceptedbandwidth bottleneck has become a serious issue of WWW, which significantly restricts the growth of webThis paper proposes a novel information-sharing mechanism, secondary web, which automatically downloadsTherefore, due to the avoidance of the information access collision, the secondary web eliminates thebandwidth bottleneck that the primary web is facing and efficiently filters out information garbage

Keywords: world wide web     secondary web     semanteme of content     bandwidth bottleneck    

Using information flowanalysis to detect implicit information leaks forweb service composition None

Jia-xin JIANG, Zhi-qiu HUANG, Wei-wei MA, Yan CAO

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 494-502 doi: 10.1631/FITEE.1601371

Abstract: Information leak, which can undermine the compliance of web-service-composition business processes forsome policies, is one of the major concerns in web service composition.reachability graph to estimate Petri net interference and thereby to detect implicit information leaks in webservice composition.

Keywords: Information flow analysis     Business process execution language     Petri net     Interference    

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security.security review or cyberspace management.review, and analyzes governments’ practices in the aspects of information technology product and servicesecurity evaluation, critical information infrastructure security evaluation and management, informationand communication technology (ICT) supply chain security, and background security investigation.

Keywords: cybersecurity review     information technology product and service     critical information infrastructure     supply chain security     background security    

A sampling method based on URL clustering for fast web accessibility evaluation

Meng-ni ZHANG,Can WANG,Jia-jun BU,Zhi YU,Yu ZHOU,Chun CHEN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 6,   Pages 449-456 doi: 10.1631/FITEE.1400377

Abstract: To improve sampling quality, stratified sampling methods first cluster web pages in a site and then drawTo address this issue, we propose a novel page sampling method based on URL clustering for web accessibilitycluster pages by their generating scripts and can thus effectively detect accessibility problems from webWe use a data set of 45 web sites to validate our method.Experimental results show that our URLSamp method is both effective and efficient for web accessibility

Keywords: Page sampling     URL clustering     Web accessibility evaluation    

Title Author Date Type Operation

Double access control model of web service based ondistributed simulation system

Chen Xueqin,Wu Huizhong,Zhu Yaoqin

Journal Article

Development of geographic information system and developi nggeographic information system

Wang Jiayao

Journal Article

Study on Data Exchange in System of Remote Monitoring Intelligent Building

Duan Jingmin, Wang Ying, Song Yongheng, Chang Hui

Journal Article

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Journal Article

Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures

He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun

Journal Article

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Journal Article

Finite element analysis and structural design of pretensioned inverted T-beams with web openings

Hock Tian CHENG, Bashar S. MOHAMMED, Kamal Nasharuddin MUSTAPHA

Journal Article

Torsional behavior of triangular web profile (TRIWP) steel section by experimental study

Fatimah DE’NAN,Hazwani HASAN,Mohd Hanim OSMAN,Sariffudin SAAD

Journal Article

Preserving privacy information flowsecurity in composite service evolution

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Journal Article

Experimental study on shear behavior of reinforced concrete beams with web horizontal reinforcement

Dong XU,Yu ZHAO,Chao LIU

Journal Article

Robust optimization of the billet for isothermal local loading transitional region of a Ti-alloy rib-web

Ke WEI, Xiaoguang FAN, Mei ZHAN, Miao MENG

Journal Article

The Secondary Web of Knowledge Embodiment

Li Youping

Journal Article

Using information flowanalysis to detect implicit information leaks forweb service composition

Jia-xin JIANG, Zhi-qiu HUANG, Wei-wei MA, Yan CAO

Journal Article

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

A sampling method based on URL clustering for fast web accessibility evaluation

Meng-ni ZHANG,Can WANG,Jia-jun BU,Zhi YU,Yu ZHOU,Chun CHEN

Journal Article