Search scope:
排序: Display mode:
Double access control model of web service based ondistributed simulation system
Chen Xueqin,Wu Huizhong,Zhu Yaoqin
Strategic Study of CAE 2009, Volume 11, Issue 8, Pages 72-78
As web service is taken up to develop distributed simulation system increasingly
Keywords: Web service security double access control distributed simulation system
Development of geographic information system and developi nggeographic information system
Wang Jiayao
Strategic Study of CAE 2009, Volume 11, Issue 2, Pages 10-16
Keywords: GIS architecture develop model Web service Grid service
Study on Data Exchange in System of Remote Monitoring Intelligent Building
Duan Jingmin, Wang Ying, Song Yongheng, Chang Hui
Strategic Study of CAE 2008, Volume 10, Issue 8, Pages 73-75
Keywords: intelligent building data inface distributed web service
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Strategic Study of CAE 2005, Volume 7, Issue 3, Pages 74-77
This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure CookieThe middleware improves the efficiency of the web applications through hardware, and reduces the difficulty
Keywords: JavaBeans Secure Cookie middleware PMI RBAC
Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures
He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun
Strategic Study of CAE 2017, Volume 19, Issue 6, Pages 44-51 doi: 10.15302/J-SSCAE-2017.06.007
Keywords: underwater tunnels service security security guarantee countermeasures long life structural defects
Paths for Improving Public Service Capability Regarding Industrial Internet Security
Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010
Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whileThe path for improving the basic capabilities of the industrial Internet security public service is proposedFinally, the development of the industrial Internet security public service is prospected from the aspectsof intelligent security service, integrated public service platform, and new generation information
Keywords: industrial Internet security security-related public service cybersecurity industrial informationsecurity innovative development
Finite element analysis and structural design of pretensioned inverted T-beams with web openings
Hock Tian CHENG, Bashar S. MOHAMMED, Kamal Nasharuddin MUSTAPHA
Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 2, Pages 148-157 doi: 10.1007/s11709-009-0030-5
Keywords: prestressed concrete inverted-T beam web opening
Torsional behavior of triangular web profile (TRIWP) steel section by experimental study
Fatimah DE’NAN,Hazwani HASAN,Mohd Hanim OSMAN,Sariffudin SAAD
Frontiers of Structural and Civil Engineering 2016, Volume 10, Issue 4, Pages 409-419 doi: 10.1007/s11709-016-0358-6
Keywords: corrugated web i-beam non uniform steel section torsion resistance torsion angle triangular web profile
Preserving privacy information flowsecurity in composite service evolution None
Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5, Pages 626-638 doi: 10.1631/FITEE.1700359
Keywords: Composite service Privacy information flow security Service evolution Petri net
Experimental study on shear behavior of reinforced concrete beams with web horizontal reinforcement
Dong XU,Yu ZHAO,Chao LIU
Frontiers of Structural and Civil Engineering 2014, Volume 8, Issue 4, Pages 325-336 doi: 10.1007/s11709-014-0080-1
Keywords: reinforced concrete beam shear strength web horizontal reinforcement experiments
Ke WEI, Xiaoguang FAN, Mei ZHAN, Miao MENG
Frontiers of Mechanical Engineering 2018, Volume 13, Issue 3, Pages 376-384 doi: 10.1007/s11465-018-0500-3
Keywords: isothermal local loading forming rib-web component transitional region robust optimization dual response
The Secondary Web of Knowledge Embodiment
Li Youping
Strategic Study of CAE 2002, Volume 4, Issue 8, Pages 8-11
World wide web (WWW) has become a primary web across the Internet, which has been widely acceptedbandwidth bottleneck has become a serious issue of WWW, which significantly restricts the growth of webThis paper proposes a novel information-sharing mechanism, secondary web, which automatically downloadsTherefore, due to the avoidance of the information access collision, the secondary web eliminates thebandwidth bottleneck that the primary web is facing and efficiently filters out information garbage
Keywords: world wide web secondary web semanteme of content bandwidth bottleneck
Using information flowanalysis to detect implicit information leaks forweb service composition None
Jia-xin JIANG, Zhi-qiu HUANG, Wei-wei MA, Yan CAO
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 494-502 doi: 10.1631/FITEE.1601371
Keywords: Information flow analysis Business process execution language Petri net Interference
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008
Cybersecurity is part of national security.security review or cyberspace management.review, and analyzes governments’ practices in the aspects of information technology product and servicesecurity evaluation, critical information infrastructure security evaluation and management, informationand communication technology (ICT) supply chain security, and background security investigation.
Keywords: cybersecurity review information technology product and service critical information infrastructure supply chain security background security
A sampling method based on URL clustering for fast web accessibility evaluation
Meng-ni ZHANG,Can WANG,Jia-jun BU,Zhi YU,Yu ZHOU,Chun CHEN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 6, Pages 449-456 doi: 10.1631/FITEE.1400377
Keywords: Page sampling URL clustering Web accessibility evaluation
Title Author Date Type Operation
Double access control model of web service based ondistributed simulation system
Chen Xueqin,Wu Huizhong,Zhu Yaoqin
Journal Article
Development of geographic information system and developi nggeographic information system
Wang Jiayao
Journal Article
Study on Data Exchange in System of Remote Monitoring Intelligent Building
Duan Jingmin, Wang Ying, Song Yongheng, Chang Hui
Journal Article
A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie
Cai Zhun,Kong Fanyu,Li Daxing
Journal Article
Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures
He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun
Journal Article
Paths for Improving Public Service Capability Regarding Industrial Internet Security
Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian
Journal Article
Finite element analysis and structural design of pretensioned inverted T-beams with web openings
Hock Tian CHENG, Bashar S. MOHAMMED, Kamal Nasharuddin MUSTAPHA
Journal Article
Torsional behavior of triangular web profile (TRIWP) steel section by experimental study
Fatimah DE’NAN,Hazwani HASAN,Mohd Hanim OSMAN,Sariffudin SAAD
Journal Article
Preserving privacy information flowsecurity in composite service evolution
Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG
Journal Article
Experimental study on shear behavior of reinforced concrete beams with web horizontal reinforcement
Dong XU,Yu ZHAO,Chao LIU
Journal Article
Robust optimization of the billet for isothermal local loading transitional region of a Ti-alloy rib-web
Ke WEI, Xiaoguang FAN, Mei ZHAN, Miao MENG
Journal Article
Using information flowanalysis to detect implicit information leaks forweb service composition
Jia-xin JIANG, Zhi-qiu HUANG, Wei-wei MA, Yan CAO
Journal Article
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Journal Article