Search scope:
排序: Display mode:
Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures
He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun
Strategic Study of CAE 2017, Volume 19, Issue 6, Pages 44-51 doi: 10.15302/J-SSCAE-2017.06.007
Keywords: underwater tunnels service security security guarantee countermeasures long life structural defects
Paths for Improving Public Service Capability Regarding Industrial Internet Security
Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010
Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whileThe path for improving the basic capabilities of the industrial Internet security public service is proposedFinally, the development of the industrial Internet security public service is prospected from the aspectsof intelligent security service, integrated public service platform, and new generation information
Keywords: industrial Internet security security-related public service cybersecurity industrial informationsecurity innovative development
Preserving privacy information flowsecurity in composite service evolution None
Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5, Pages 626-638 doi: 10.1631/FITEE.1700359
Keywords: Composite service Privacy information flow security Service evolution Petri net
Double access control model of web service based ondistributed simulation system
Chen Xueqin,Wu Huizhong,Zhu Yaoqin
Strategic Study of CAE 2009, Volume 11, Issue 8, Pages 72-78
As web service is taken up to develop distributed simulation system increasingly
Keywords: Web service security double access control distributed simulation system
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008
Cybersecurity is part of national security.security review or cyberspace management.review, and analyzes governments’ practices in the aspects of information technology product and servicesecurity evaluation, critical information infrastructure security evaluation and management, informationand communication technology (ICT) supply chain security, and background security investigation.
Keywords: cybersecurity review information technology product and service critical information infrastructure supply chain security background security
Information sharing and performance of service supply chain
Yang Shanlin,Cheng Fei,Yang Changhui
Strategic Study of CAE 2011, Volume 13, Issue 8, Pages 80-86
The service supply chain consisting of one service vendor (SV) and oneservice integrator (SI) was studied.The service vendor supplies original service productions or activities to the SI that in turn sells thevalue-add integration service to customers.In this paper, we developed information sharing and performance of service supply chain between SV and
Keywords: service supply chain service vendor service integrator information sharing coordination
Development of geographic information system and developi nggeographic information system
Wang Jiayao
Strategic Study of CAE 2009, Volume 11, Issue 2, Pages 10-16
Keywords: GIS architecture develop model Web service Grid service
Soil security and global food security
Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530
● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.
Keywords: Agriculture soil security food security regenerative
Service-oriented manufacturing: A literature review and future research directions
Frontiers of Engineering Management 2022, Volume 9, Issue 1, Pages 71-88 doi: 10.1007/s42524-021-0171-3
Keywords: service-oriented manufacturing product– service systems servitization servicing operations mana-
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 144-151 doi: 10.15302/J-FASE-2015062
Keywords: food security protein security nutrition dietary pattern
Development of Intelligent Connection Computing Network Technologies
Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014
Keywords: technology diversified protocol integration of network storage and computing intelligent arrangement of servicefunctions endogenous security
Towards a self-adaptive service-oriented methodology based on extended SOMA
Alireza PARVIZI-MOSAED,Shahrouz MOAVEN,Jafar HABIBI,Ghazaleh BEIGI,Mahdieh NASER-SHARIAT
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1, Pages 43-69 doi: 10.1631/FITEE.1400040
Keywords: Quality attribute Adaptation pattern Architectural tactic Service-oriented architecture Self-adaptive
Service life prediction of fly ash concrete using an artificial neural network
Frontiers of Structural and Civil Engineering 2021, Volume 15, Issue 3, Pages 793-805 doi: 10.1007/s11709-021-0717-9
Keywords: concrete fly ash carbonation neural networks experimental validation service life
Frontiers of Engineering Management Pages 391-405 doi: 10.1007/s42524-022-0206-4
Keywords: system availability product-service integration installed base new product introduction service supply
Blockchain application in healthcare service mode based on Health Data Bank
Jianxia GONG, Lindu ZHAO
Frontiers of Engineering Management 2020, Volume 7, Issue 4, Pages 605-614 doi: 10.1007/s42524-020-0138-9
Keywords: Health Data Bank blockchain data assets smart contract incentive mechanism
Title Author Date Type Operation
Service Security of Underwater Tunnel Lining Structures and Corresponding Guarantee Countermeasures
He Chuan,Liu Sijin,Zhang Yuchun and Feng Kun
Journal Article
Paths for Improving Public Service Capability Regarding Industrial Internet Security
Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian
Journal Article
Preserving privacy information flowsecurity in composite service evolution
Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG
Journal Article
Double access control model of web service based ondistributed simulation system
Chen Xueqin,Wu Huizhong,Zhu Yaoqin
Journal Article
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Journal Article
Information sharing and performance of service supply chain
Yang Shanlin,Cheng Fei,Yang Changhui
Journal Article
Development of geographic information system and developi nggeographic information system
Wang Jiayao
Journal Article
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Journal Article
Development of Intelligent Connection Computing Network Technologies
Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing
Journal Article
Towards a self-adaptive service-oriented methodology based on extended SOMA
Alireza PARVIZI-MOSAED,Shahrouz MOAVEN,Jafar HABIBI,Ghazaleh BEIGI,Mahdieh NASER-SHARIAT
Journal Article
Bridging reliability and operations management for superior system availability: Challenges and opportunities
Journal Article