首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 456 毫秒
1.
随着科技的快速发展,国防装备复杂程度日益增高,目前,以军方的保障能力要想合理有效地独立完成其保障任务仍有难度。为了提供更好的供应保障,基于民用飞机维修体系,结合国防装备使用特点,从军民融合的视角提出民用飞机维修体系建设经验在国防装备保障领域的应用建议,将民用飞机维修体系中的客户需求分析、健康监控与管理技术、维修策略、保障模式等融入国防装备研究领域,健全完善国防装备的技术和保障模式。  相似文献   

2.
It has always been claimed that smart cards provide a really high level of security, considering them as a tamper-proof device, with the possibility to auto-block some or all of the services it provides. Unfortunately, nowadays some hackers appear to have demonstrated the lack of security involved in some applications where Integrated Circuit Cards (ICC) have been used. This has led to the opinion that smart cards are not secure enough, and their security is only in the minds of the commercial companies involved with the technology. In this paper, the author explains the reasons why this hacking has succeeded. For example, sometimes memory cards have been used instead of smart cards, or very old smart cards have been issued and not renewed, or the development team involved has not used basic security techniques, such as diversified keys. The author also gives clues to achieve a high level of security depending on the final application, and the environment in which it is going to be used  相似文献   

3.
新一代蜜网技术剖析   总被引:4,自引:0,他引:4  
王旅 《航空计算技术》2004,34(4):121-123,127
蜜网是一种高交互的蜜罐,提供高度控制的网络环境,学习入侵者的工具、手法和动机。新一代的蜜网系统是蜜网技术的进一步发展,更加灵活和容易部署,具有更好的扩展性、管理能力和安全性。本文尝试对它的关键技术进行探讨分析。  相似文献   

4.
存储在数据库中的数据必须具有安全保证.为此,DBMS提供了安全管理技术.安全性策略是DBMS实现安全管理的基本技术.文章较详细地介绍了Oracle 9i数据库管理系统的安全管理技术中的安全性策略.这些策略涉及系统安全性策略、数据安全性策略和用户安全性策略.进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制.上述安全技术构成了Oracle 9i数据库安全管理技术的基础,也是DBA必须掌握的基本技术.文章最后给出Oracle 9i安全策略的优点.  相似文献   

5.
刘陈  张峰 《航空计算技术》2008,38(6):126-129
智能家庭网络是信息时代的高科技产物,它采用现有的计算机网络技术,将家庭内各种家电设备连网,通过网络为人们提供各种丰富、多样化、个性化、方便、舒适、安全和高效的服务.随着人们对智能家庭的兴趣逐渐升温,智能化信息家电产品已经开始步入社会和家庭.在此背景下,提出了一种实现智能家庭网络的解决方案.将OSGi规范应用于智能家庭网关,无线通讯设备连入家庭网络,实现基于GSM无线通讯的远程监控系统.  相似文献   

6.
在分析末端敏感弹外弹道过程中,引入了仿真技术,该技术充分采用了定量和定性相结合的武器论证思想,为帮助决策者分析和论证末端敏感弹综合指标提供科学的理论依据。本文首先应用蒙特卡罗分析法建立了外弹道随机模型,在此基础上设计了图形空间变换数学模型,并采用面向对象技术设计图形仿真系统,最后基于OpenGL实现了一个有效的可视化仿真实验平台,实验结果表明,该图形仿真有效地反映了弹道动态情况。  相似文献   

7.
网络安全漏洞扫描与脆弱性分析研究   总被引:1,自引:0,他引:1  
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。首先介绍了网络安全漏洞的风险分级;然后分析和讨论了漏洞扫描的基本原理和过程及漏洞扫描技术,包括端口扫描技术和漏洞检测技术;并在此基础上提出了一种可以提高扫描效率和扫描效果的"逐级判断"扫描策略;最后,作为对网络漏洞扫描技术的补充,简要介绍和讨论了系统脆弱性分析技术。  相似文献   

8.
基于AADL的航空电子系统安全性分析   总被引:1,自引:0,他引:1  
AADL是一种描述嵌入式实时系统的软硬件结构、安全性、可靠性等关键性能特性的重要手段,目前已广泛应用于基于ARINC653的综合化航电系统。安全性作为综合化航电系统的关键性能之一,已成为需要解决的重要问题。详细阐述了基于AADL的航空电子系统安全性分析的原理,并给出了一种可行的航空电子系统安全性分析的设计和实现方案,为航空电子系统安全性的设计提供了一种验证方法。  相似文献   

9.
随着信息技术的高速发展,信息安全已越来越受到人们的普遍重视。特别是安全部门对文件的保密工作尤为重视,对机密文件的审阅人有严格的限制。介绍纸张上残留的痕迹(主要是汗潜指纹)的检测原理和工作过程。提取汗潜指纹通常采用的方法是用灰粉或墨粉进行处理,但在渗透性材料上,如纸张、硬纸板等最合适的方法是采用碘熏法。这些方法均会对检样造成不同程度上的损坏,为了保持原检样的完整性,提出了一种对纸张上的汗潜指纹进行检测与成像的新方法。通过检测纸张有痕迹和无痕迹处的阻抗,将此阻抗信号处理后,输入到计算机。  相似文献   

10.
航空电子系统硬件的发展,为云服务技术在航空领域的应用提供了可能。借助虚拟化及容器管理技术, 将机载计算资源进行池化管理,并借助服务化技术,将复杂航电软件拆分为可协作的独立模块,能够实现航电 软件的快速构建、灵活部署,并提高航电软件之间的互操作能力。本文讨论了云服务技术在航空领域的应用现 状,研究并提出了一种应用于航电软件研发的云服务架构,给出了服务化和容器管理平台的实现方案,并构建 了应用原型验证环境。  相似文献   

11.
】全球定位系统(GPS)已经达到初始运行能力,其完好性还不能满足全部飞行阶段的要求。接收机自主完好性监控(RAIM)为GPS的航空用户提供了完好性监控手段。文中集中讨论了实现RAIM的几种检测和判定方法,并对RAIM技术及其潜能进行评估  相似文献   

12.
民机机载信息系统作为机载网络与地面网络的机上连接终端,在带来机载信息与地面网络信息传递便利的同时,也对机载网络安全性设计提出了更苛刻的要求。通过对机载信息系统与地面网络架构研究,分析了可能由地面网络技术引入的网络安全威胁,并针对这些威胁探讨了相对应的安全防护策略和机载信息系统研制应遵循的适航取证方法。  相似文献   

13.
阐明了网络安全体系是一个保证网络安全的体系结构,涉及到法律、技术、管理等方面;从 TCP/IP 协议体系角度对网络安全存在的问题入手分析,并对目前采用的安全策略及安全技术进行了剖析。  相似文献   

14.
文章分析了Windows2000Server的安全问题以及适用策略,为Windows2000Server局域网络的安全提供参考。  相似文献   

15.
基于IMD的Windows网络数据包拦截技术及应用   总被引:2,自引:0,他引:2  
吴雷  顾其威 《航空计算技术》2004,34(1):119-121,125
随着网络安全问题日益严重,网络安全产品也被人们重视起来。所有基于Windows操作系统的桌面防火墙核心技术点在于Windows操作系统下网络数据包拦截技术。主要介绍了Win dows操作系统下网络数据包拦截的技术,特别是基于IMD的网络数据包拦截方法以及应用。  相似文献   

16.
网络控制中的信息安全问题   总被引:2,自引:0,他引:2  
在对网络控制系统及其特点进行分析的基础上,提出了网络控制中的信息安全问题,并对网络控制中的信息安全对策进行了研究和探讨,为网络控制的安全实施提供了有力的保障。  相似文献   

17.
Although weaknesses have been demonstrated in some security techniques (encryption, protocols, mobile code such as Java, etc.), current security technology is quite strong in many areas. Despite this, information security has proved difficult to achieve in large modern software systems. Many problems have been reported in which supposedly secure systems have been penetrated and, in some cases, significant damage done. One problem considered is a buffer-overrun attack. The idea called a 〈wrapper〉 which is a layer of software that logically surrounds a software artifact and enhances the functionality of the artifact in some way, is then discussed. Most proposals for the use of wrappers assume that their presence is transparent to the artifact being wrapped. In other words, the artifact sees its operating environment as unchanged and the artifact does not have to be modified in i order to permit it to be wrapped. Wrappers have been proposed as an approach to dealing with deficiencies in existing systems, deficiencies in security for example. The use of shells as a feasible solution to the problem of security is also considered  相似文献   

18.
河流、水库、湖泊的水位监测直接为水利、水运、防洪、防涝提供具有单独使用价值的资料,对人们的生产生活具有重要的意义。GPS-IR测高技术的出现为水位监测提供了新的手段。首先介绍了基于SNR观测值的GPS-IR水面测高技术的基本原理。在西安灞河悬挑平台上使用3组不同的仪器进行GPS-IR测高实验,以水位计结果为基准分析了测高精度,并探究了频段、高度角区间、扼流圈天线对GPS-IR水面测高精度的影响。得到了最佳RMS结果为1.04cm的精度,指出目前L1频段的信噪比更适合测高反演,而GPS现代化后L2频段进行测高则是更好的选择。给出了高度角区间选取的准则,证实扼流圈天线对GPS-IR技术影响不大。实验结果表明,可利用已有的GPS变形监测站,基于GPS-IR技术选取最优的参数配置监测河流、水库、湖泊的水位变化。  相似文献   

19.
There are approximately 7 million maritime-style containers within Canada, and 70 million within the US. The interiors of such containers are rarely inspected. With market globalization, a large amount of these containers enter North America on a daily basis. Such containers may include contraband or dangerous items that present an economic or security risk. Despite significant security improvements, only 3 to 5 % of the maritime containers, that arrive in, or transition through, North America, go through physical inspection. Current container tracking technologies based on GPS consume high DC power, are costly, require line-of-sight with satellites, and are often too large to be covert. It is possible to overcome some of these limitations by basing the tracking system on the FM broadcast signal which is an alternative man-made signal that is reasonably ubiquitous, provides a geographically-unique frequency spectrum and is about 100,000 times as strong as a GPS satellite signal. This allows the development of a low-cost, low-power and miniature FM receiver that can record frequency spectrums and compare them to known data in order to trace the path that the container has taken for less than $10 per container. This presents the first results of highway trials (train and sea trials are currently being conducted) of such a low-cost, covert, non-GPS based technology (called "FM Tag") that records the worldwide displacement of containers and displays the path undertaken by the container while in transit. As an added security benefit, the tag is also capable of detecting container door openings. In addition to presenting the first trial results, this covers the innovative engineering aspects of using the metal enclosure of a maritime container as a VBF antenna, thereby eliminating the need to add an external antenna and achieving the goal of being 100% covert.  相似文献   

20.
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号