共查询到20条相似文献,搜索用时 93 毫秒
1.
2.
3.
4.
随着我国中继卫星系统的不断建设与发展,如何完善系统的组网运行管理,构建一个高可靠性和高可用度的系统是摆在我们面前的重要课题。在对美国TDRSS(跟踪与数据中继卫星系统)的卫星在轨备份、轨道漂移、卫星共位、地面终端站配置以及系统总体性能等方面进行分析的基础上,总结出其组网运行的4个特点:空间段具有备份节点、备份星;地面段配置备份中心、备份站;系统具备2颗卫星共位能力;系统具备轨道漂移能力。结合我国中继卫星系统建设与发展实际,得出了以下几点启示:加快备份星和备份站的部署与建设;适时形成单节点多星的星群配置;增加支持卫星轨道漂移和共位的能力;增加大椭圆轨道卫星的部署。 相似文献
5.
6.
7.
8.
针对我国某大型飞机飞控系统机械备份钢索传动组件在装配过程的瓶颈问题,就设计原理、工艺方法等进行讨论和研究,找出了问题产生的根本原因,提出了机械备份系统钢索传统组件装配解决方案。 相似文献
9.
在计算机日益普及、数字化日益发展的信息时代,计算机数据已经成为一个国家、部门、企业乃至个人的重要财产。由于各种人为或自然等不确定因素的存在,计算机数据随时都有可能损坏或丢失,为保证这些数据的安全,必须采取必要的安全防护和备份措施。本文结合西航集团公司具体情况,介绍了为保证数据安全,如何进行计算机安全管理和实现数据备份以及数据恢复几种方法。 相似文献
10.
对迎角传感器加温电路的组成和工作原理进行了阐述,解释了"侧向通道无备份"的种类和含义。结合电传系统安装架加温控制逻辑电路,整理和总结了电传系统工作状态与迎角传感器加温状态之间的逻辑关系,进一步分析了由风标加温引起的"侧向通道无备份"故障机理。 相似文献
11.
Sanchez-Reillo R. Lopez-Ongil C. Entrena-Arrontes L. Sanchez-Avila C. 《Aerospace and Electronic Systems Magazine, IEEE》2003,18(6):21-24
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased security in some aspects, such as cryptographic algorithms and authentication techniques, etc. But many other security holes have appeared in these applications, making the improvements achieved a "waste of time and money". In this paper, some of these security holes are exposed. Using security hardware modules can overcome some of these holes, if they are designed according to the applications specification. 相似文献
12.
我国社会保障基金的制度缺陷及其对策 总被引:3,自引:0,他引:3
社会保障基金的筹集和使用具有调节宏观经济的财政效应,但目前我国社保基金的制度缺陷使其对宏观经济的调节作用受到了很大制约。只有多元化筹集社会保障基金,突破原有投资格局的限制,才能消除社会保障基金的制度缺陷,发挥其财政效应。 相似文献
13.
在远程网络环境下,由多个分散数据库组成的管理信息系统在当前十分普及,如何采用最小代价将分散数据库整合成准分布式数据库系统是一个迫切需要解决的问题。Oracle的分布式数据库功能允许用户将多个站点上的数据库作为一个逻辑上的整体,数据一致性、完整性及安全性都得以实现。在阐述了如何使用Oracle建立分布式数据库基础上,提出了解决数据复制问题的方法。实践证明,Oracle可以提供完备的方案建立分布式数据库。 相似文献
14.
PKI在远程故障诊断系统中的应用研究 总被引:1,自引:0,他引:1
介绍了网络安全在远程故障诊断信息化系统中的项目背景,对系统涉及的敏感数据业务环节的信息安全,保密技术进行了分析。系统运用VPN的专用性,建立起安全的网络通路,同时运用PKI/CA,增强了系统安全的可控性,保证系统的整体运行性能,为企事业单位的远程故障诊断提供了一个成功的解决方案。 相似文献
15.
The importance of considering computer security as part of the software quality assurance practice is discussed. Issues that point to the need for integration of quality assurance and computer security disciplines are raised. To address some of these issues, the NASA Automated Information Security (AIS) program is presented as a model that may be used for improving interactions between the quality assurance and computer security community of professionals. The information presented does not comprise an answer to documenting all computer security interactions with quality assurance, but it does present a currently working baseline model and can serve as a basis for future research and discussion 相似文献
16.
17.
Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to corporate networks. Several researchers are looking at the possibility of the existence of a total of three networks: passenger network (PN); crew network (CRN); and the control network (CON). Researchers envision an architecture where these three networks will co-exist in an airplane. The available Internet connectivity can be utilized for transporting flight critical information like cockpit flight data recorder (CFDR) data, digital flight data recorder (DFDR) data, cockpit voice recorder (CVR) data, and controller pilot data link communication. In addition, the Internet connectivity could also be used for other safety mechanisms like video surveillance and remote control of the flight. Security is one of the major concerns that affect the successful deployment of aircraft data networks (ADN) and other safety features. Several studies have been carried out to secure the network using firewalls and intrusion detection system but so far no study has focused on securing the communication channel (between the aircraft and the ground station) and its impact on the ADN. The scope of this research is to determine the viability and need of a security mechanism. The research also focuses on the performance of different security architectures and determine their usability in the framework of an ADN. 相似文献
18.
存储在数据库中的数据必须具有安全保证.为此,DBMS提供了安全管理技术.安全性策略是DBMS实现安全管理的基本技术.文章较详细地介绍了Oracle 9i数据库管理系统的安全管理技术中的安全性策略.这些策略涉及系统安全性策略、数据安全性策略和用户安全性策略.进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制.上述安全技术构成了Oracle 9i数据库安全管理技术的基础,也是DBA必须掌握的基本技术.文章最后给出Oracle 9i安全策略的优点. 相似文献
19.
化学法处理大批量导弹液体推进剂废液废水 总被引:2,自引:0,他引:2
通过对导弹液体推进剂废液废水的组成和化学性质的分析,确定废液废水的处理方法。根据化学反应和实验结果确定处理剂的用量,分别对氧化剂和燃料废液废水的处理工艺进行了设计,并提出了防止大气污染、安全快速的有效处理措施。 相似文献
20.
On measurement of operational security 总被引:1,自引:0,他引:1
Brocklehurst S. Littlewood B. Olovsson T. Jonsson E. 《Aerospace and Electronic Systems Magazine, IEEE》1994,9(10):7-16
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of “the ability of the system to resist attack.” That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit “more secure behavior” in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behavior will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working toward measures of “operational security” similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches, or the probability that a specified “mission” can be accomplished without a security breach. This new approach is based on the analogy between system failure and security breach, but it raises several issues which invite empirical investigation. We briefly describe a pilot experiment that we have conducted to judge the feasibility of collecting data to examine these issues 相似文献