Security Model Based on Network Business Security

Size: px
Start display at page:

Download "Security Model Based on Network Business Security"

Transcription

1 Security Model Based on Network Business Security Wu Kehe, Zhang Tong, Li Wei, Ma Gang Department of Computer Science and Technology North China Electric Power University Beijing, China

2 Abstract Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business.

3 I. INTRODUCTION II. CONCEPT OF NETWORK BUSINESS SECURITY III. DESCRIPTION OF CONCEPT BASED ON NETWORK IV. MODEL OF NETWORK BUSINESS SECURITY V. CONCLUSION

4 Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security field after sea, land, air and space. I. INTRODUCTION

5 Existing Theory of Information Security System

6 First of all, this paper defines the "network business" concept. Network business means enterprise management business or controlling process of Production Automation System running on network. It can be further described as follows: II. CONCEPT OF NETWORK BUSINESS SECURITY

7 1) It is composed of function program running on network platform, realizing the enterprise management business processes and production control logic. 2) In the network environment, staff work in accordance with logic and rhythm of business management software, or in accordance with process of control logic, which can constitute the realization of the network business. 3) From the computer network system level, network business is composed of network process set, data sets and process operation sequence set. Based on the analysis of network business s concept and features, "network security" is defined as follows: network security means the reliability, stability and real-time of business running on the network, the continuity of business processes and business operation s confidentiality and non-repudiation.

8 BUSINESS SECURITY Enterprise Information Network is not only the platform for information sharing and information exchanging, but also the platform for enterprise business running on and collaborative operation. Therefore, the Enterprise Information Network security is not only to protect the security of data in network, but also to protect the security of business running on network. III. DESCRIPTION OF CONCEPT BASED ON NETWORK

9 The Information Security System Based on Data,Network and Network Business

10 According to the definition of network business and network business security in this paper, we can conclude that network business is composed of the network process sets, data sets and process operation sequence sets. Network business security is the security of network process sets and data sets, more precisely, is the security of network processes running and writing operation on data sets. According to the above description of network business and network business security, this paper describes the network security model specifically as follows: IV. MODEL OF NETWORK BUSINESS SECURITY

11 a) Process Set: P={p0,p1,p2,;,pn}. pirp, is a process running on Enterprise Infromation Network. b) Data Set: D={d0,d1,d2,;,dm}. djrd$ is the data which processes access to. c) Access Set: F={f0,f1,f2,;,fn}. firf, fi=f(p,d). f(p,d) means the model of process p access to data d. Model Description

12 e) Business Set: B= (P+,D+,F+,S). A business is composed of all of process which can finish the business, all of data which the business needs, the access property of processes access to data and ordered sequence between these processes. All of businesses compose the whole network application system which the model defendes.

13 According to the above description of network business and network business security, this paper abstracts the following two properties: Property 1: The defense of data is the defense of writing operation on data, the defense of reading operation on data is not necessary. Property 2: The right ordered sequence between processes which network businesses needed must not be changed. According to the above two properties, the model constraint can be described as follows: Model Constraints

14 For Property 1: This paper defines pclass(p) as the access class of process p, dclass(d) as the access class of data d. Property 1 can be described as: only if the access class of process p is higher than the access class of data d, process p can write data d. The security formula is: For all prp$drd if wrf(p,d) then pclass(p)>=dclass(d) (1) For Property 2: For any business b, the ordered sequence between processes which business b needs must not be changed. T he security formula is: For all brb S=G(P+)=(P1 + $P2 +,;,Pk +) (2) 3) Definition of Security Status For each business, the all processes and all data must meet the f(p,d) and G(P+) constraint, so we think the business is safe. If all of businesses in the network system is safe, then the application system in network is safe.

15 On the basis of research on actual needs and current application status of Enterprise Information System network security defense, according to the key points of Enterprise Information System network defense, this paper has proposed the network business security concept by theoretical study and research on information security, dividing protection object of information security into data security, network security and network business security. New information security concept considers network business security as an important protection object in Enterprise Information Network, well explaining special problems in Enterprise Information Systems. This paper specifically addresses the meaning of network business security and gives the formal description of network business security model, providing theoretical basis for security development and planning of Enterprise Information System. V. CONCLUSION

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China Zhongqiang Liu 1, Kaiyi Wang 1*, Shufeng Wang 1, Feng Yang 1 and Xiandi Zhang 1, 1 Beijing Research Center for

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

A Framework of Information Management System for Construction Projects

A Framework of Information Management System for Construction Projects A Framework of Information Management System for Construction Projects Ma Zhiliang and Qin Liang Department of Civil Engineering, Tsinghua University, Beijing 100084 ([email protected]; [email protected])

More information

HUMAN-COMPUTER INTERFACE DEVELOPMENT OF WIRELESS MONITORING SYSTEM BASED ON MINIGUI

HUMAN-COMPUTER INTERFACE DEVELOPMENT OF WIRELESS MONITORING SYSTEM BASED ON MINIGUI HUMAN-COMPUTER INTERFACE DEVELOPMENT OF WIRELESS MONITORING SYSTEM BASED ON MINIGUI Zhihua Diao 1, Chunjiang Zhao 2,1, Xiaojun Qiao 2,*, Cheng Wang 2, Gang Wu 1, Xin Zhang 2 1 University of Science and

More information

Demand Forecasting Optimization in Supply Chain

Demand Forecasting Optimization in Supply Chain 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V52.12 Demand Forecasting Optimization

More information

Operation and Maintenance Management Strategy of Cloud Computing Data Center

Operation and Maintenance Management Strategy of Cloud Computing Data Center , pp.5-9 http://dx.doi.org/10.14257/astl.2014.78.02 Operation and Maintenance Management Strategy of Cloud Computing Data Center Wei Bai 1, Wenli Geng 1 1 Computer and information engineering institute

More information

Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine

Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine Qinghua Han, Shujun Li*, ifan Li, Jin Wang, Jiwei Ma, Donglin Zhao Chinese Academy of Agricultural Mechanization

More information

One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)

One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA) One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA) Wei Chen, Jin-cheng Zhang, and Yu-quan Jiang Nanjing Audit University, Nanjing, Jiangsu 210029, China [email protected]

More information

On the Development of Web-based Distance Physical Education

On the Development of Web-based Distance Physical Education SHS Web of Conferences 19, 02005 (2015) DOI: 10.1051/ shsconf/2015190200 5 C Owned by the authors, published by EDP Sciences, 2015 On the Development of Web-based Distance Physical Education Shaohui Yuan,

More information

Studying on Construction Programs of the Platform of Primary Products Marketing

Studying on Construction Programs of the Platform of Primary Products Marketing Studying on Construction Programs of the Platform of Primary Products Marketing Gang Lu 1,Peng Lu 2,Cuie Liu 3 1,3 School of Management and Engineering, Shijiazhuang University of Economics, Shijiazhuang,

More information

The study on the Human Resource Management of the Logistics Enterprises Based On the Competency Model

The study on the Human Resource Management of the Logistics Enterprises Based On the Competency Model , The study on the Human Resource Management of the Logistics Enterprises Based On the Competency Model You Chun Li Yanping School of Economics and Management Wu Han University,Luojia Mountain, Hubei,P.R.China,430072

More information

Design of Data Archive in Virtual Test Architecture

Design of Data Archive in Virtual Test Architecture Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei

More information

A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN

A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN Hui Li 2,1, Zetian Fu 1,2,*, Yan Li 3, Jian Zhang 2,1 1 College of Engineering, China Agricultural University, Beijing, China, 100083;

More information

PERSONALIZED WEB MAP CUSTOMIZED SERVICE

PERSONALIZED WEB MAP CUSTOMIZED SERVICE CO-436 PERSONALIZED WEB MAP CUSTOMIZED SERVICE CHEN Y.(1), WU Z.(1), YE H.(2) (1) Zhengzhou Institute of Surveying and Mapping, ZHENGZHOU, CHINA ; (2) North China Institute of Water Conservancy and Hydroelectric

More information

A Case Study of Question Answering in Automatic Tourism Service Packaging

A Case Study of Question Answering in Automatic Tourism Service Packaging BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question

More information

Food Safety Control from the Perspective of Supply Chain

Food Safety Control from the Perspective of Supply Chain International Conference on Education Technology and Economic Management (ICETEM 2015) Food Safety Control from the Perspective of Supply Chain Weiyan Xie Guangxi Vocational College of Technology and Business,

More information

Comparison Control Strategies for ISG hybrid electric vehicle. Hailu Tang 1, a

Comparison Control Strategies for ISG hybrid electric vehicle. Hailu Tang 1, a 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Comparison Control Strategies for ISG hybrid electric vehicle Hailu Tang 1, a School of Automotive Engineering,Wuhan University

More information

Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net

Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Peigen Li, Ke Shi, Jie Zhang Intelligent Manufacturing Lab School of Mechanical Science and Engineering Huazhong University of Science

More information

Network Attack Platform

Network Attack Platform Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute

More information

Supply Chain Quality Management Based on Information Asymmetry

Supply Chain Quality Management Based on Information Asymmetry Supply Chain Quality Management Based on Information Asymmetry Jianhua Zhao 1, Yue Hu 2, Yi Wang 3 College of Economic and Management, China Three Gorges University, Yichang Hubei Province, China 443002

More information

How to use Ez Trade Builder

How to use Ez Trade Builder How to use Ez Trade Builder If you are an experienced options trader or just learning how to trade options, the right tools are critical to becoming profitable and minimizing your risk. This is a very

More information

An Advanced Commercial Contact Center Based on Cloud Computing

An Advanced Commercial Contact Center Based on Cloud Computing An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Enterprise Architecture in Banking

Enterprise Architecture in Banking Enterprise Architecture in Banking By Clive Finkelstein Contents Enterprise Architecture in Banking... 1 Contents... 1 Introduction... 1 Banking Case Study... 1 Strategic Plan was the Catalyst for the

More information

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

More information

Strategies for Developing a Document Imaging & Electronic Retention Program

Strategies for Developing a Document Imaging & Electronic Retention Program Is it okay to destroy the paper source records? Are there any exceptions? Strategies for Developing a Document Imaging & Electronic Retention Program How do we ensure the program will stand up in court?

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

Analysis of China Motor Vehicle Insurance Business Trends

Analysis of China Motor Vehicle Insurance Business Trends Analysis of China Motor Vehicle Insurance Business Trends 1 Xiaohui WU, 2 Zheng Zhang, 3 Lei Liu, 4 Lanlan Zhang 1, First Autho University of International Business and Economic, Beijing, [email protected]

More information

Cloud Security - Characteristics, Advantages and Disadvantages

Cloud Security - Characteristics, Advantages and Disadvantages The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,

More information

On-line Payment and Security of E-commerce

On-line Payment and Security of E-commerce ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,

More information

On the Development of College Student Information Management System

On the Development of College Student Information Management System SHS Web of Conferences 17, 02010 (2015) DOI: 10.1051/ shsconf/201517 02010 C Owned by the authors, published by EDP Sciences, 2015 On the Development of College Student Information Management System Anjiang

More information

HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7?

HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7? HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7? This document contains introduction to P2ware Project Manager 7 views (P2ware Project Manager 7 walkthrough) and shows how to create high quality plans

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

A practical and novel standard addition strategy to screen. pharmacodynamic components in traditional Chinese medicine using

A practical and novel standard addition strategy to screen. pharmacodynamic components in traditional Chinese medicine using Electronic Supplementary Material (ESI) for RSC Advances. This journal is The Royal Society of Chemistry 2015 A practical and novel standard addition strategy to screen pharmacodynamic components in traditional

More information

AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS

AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS Jianping Li Jinli Liu Weixuan Xu 1.University of Science & Technology of China, Hefei, 230026, P.R. China 2.Institute of Policy and Management

More information

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam

More information

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China

More information

Statistical process control analysis based on software Q-das

Statistical process control analysis based on software Q-das American Journal of Theoretical and Applied Statistics 2014; 3(4): 90-95 Published online July 20, 2014 (http://www.sciencepublishinggroup.com/j/ajtas) doi: 10.11648/j.ajtas.20140304.12 ISSN: 2326-8999

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Construction of Library Management Information System

Construction of Library Management Information System Construction of Library Management Information System Lian-feng Zhang, Rui-jin Zhou, Li-ping Sui, and Guo-qing Wu Henan Institute of Science and Technology Xin-xiang, China [email protected] Abstract. Library

More information

Procedure for Master s Degree Thesis Defense, Graduate Institute of Art History, National Taiwan Normal University

Procedure for Master s Degree Thesis Defense, Graduate Institute of Art History, National Taiwan Normal University Procedure for Master s Degree Thesis Defense, Graduate Institute of Art History, National Taiwan Normal University Passed at the General Affairs Committee, June 13, 2011 Revisions passed at the General

More information

Research and Implementation of Customizable Dynamic Website Management System

Research and Implementation of Customizable Dynamic Website Management System 2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research and Implementation of Customizable Dynamic Website Management

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

MODERN EDUCATION TECHNOLOGY WITH CREATIVITY OF CONTINUING EDUCATION

MODERN EDUCATION TECHNOLOGY WITH CREATIVITY OF CONTINUING EDUCATION MODERN EDUCATION TECHNOLOGY WITH CREATIVITY OF CONTINUING EDUCATION Luo Long, Liang Zhaohui, Wu Gengsheng, Yang Xiaoqin Continuing Education School of Tsinghua University 100084 Beijing, China [email protected]

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT

DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT Keming Du 1, Zhongfu Sun 1,*, Huafeng Han 1, Shuang Liu 1 1 Institute of Environment and Sustainable Development in Agriculture(IEDA),

More information

Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm

Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm Xi Wang, Chun Wang, Wei Dong Zhuang, and Hui Yang Engineering Collage, Heilongjiang August the First

More information

Introduction to Leadership and Management of. Non-profit Organizations. Syllabus

Introduction to Leadership and Management of. Non-profit Organizations. Syllabus Introduction to Leadership and Management of Non-profit Organizations Syllabus Spring 2013 School of Social Development and Public Policy Beijing Normal University Li Jing Master of Public Policy, Harvard

More information

A Research and Practice of Agile Unified Requirement Modeling

A Research and Practice of Agile Unified Requirement Modeling 2009 International Symposium on Intelligent Ubiquitous Computing and Education A Research and Practice of Agile Unified Requirement Modeling Huang ShuiYuan, Duan LongZhen, Xie Jun, Tao JunCai, Chen GuiXiang

More information

A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem

A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem Sayedmohammadreza Vaghefinezhad 1, Kuan Yew Wong 2 1 Department of Manufacturing & Industrial Engineering, Faculty of Mechanical

More information

Research on small and medium enterprises financing mode based on supply chain finance

Research on small and medium enterprises financing mode based on supply chain finance Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 0, ():88-8 Research Article ISSN : 09-8 CODEN(USA) : JCPRC Research on small and medium enterprises financing mode based

More information

Commercial software development with the help of J2EE architecture and MVC

Commercial software development with the help of J2EE architecture and MVC Journal of The International Association of Advanced Technology and Science Commercial software development with the help of J2EE architecture and MVC Anup Kumar Ranjeeta chauhan 1. Abstract The Java 2

More information

The Need for Intelligent Network Security: Adapting IPS for today s Threats

The Need for Intelligent Network Security: Adapting IPS for today s Threats The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network

More information

Data Mining in the Application of Criminal Cases Based on Decision Tree

Data Mining in the Application of Criminal Cases Based on Decision Tree 8 Journal of Computer Science and Information Technology, Vol. 1 No. 2, December 2013 Data Mining in the Application of Criminal Cases Based on Decision Tree Ruijuan Hu 1 Abstract A briefing on data mining

More information

The Evaluation Model of HD Interactive TV Shopping Service

The Evaluation Model of HD Interactive TV Shopping Service , pp.175-179 http://dx.doi.org/10.14257/astl.2014.53.38 The Evaluation Model of HD Interactive TV Shopping Service Mengke Yang a, Jianqiu Zeng b Beijing University of Posts and Telecommunications, BUPT,

More information

Project Time Management

Project Time Management Project Time Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Please

More information

Boosting SMEs with Better and Innovative Financing Services

Boosting SMEs with Better and Innovative Financing Services ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sciences Vol. 4 (2014) No. 2 Boosting SMEs with Better and Innovative Financing Services Wei Liu 1 1 Department of Integrated

More information

BTBU Master of Control Theory and Control Engineering

BTBU Master of Control Theory and Control Engineering BTBU Master of Control Theory Control Discipline class: Primary discipline:control Science Sub-discipline: Control Theory Control Sub-discipline code:081101 一 Program Overview The program aims to educate

More information

OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP

OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP Xing Xu School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: [email protected]

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

The Application of 360 +KPI Performance Evaluation Model in Chinese and Western Culture Background

The Application of 360 +KPI Performance Evaluation Model in Chinese and Western Culture Background The Application of 360 +KPI Performance Evaluation Model in Chinese and Western Culture Background Wei Tan The Institute of Public Affairs, Chongqing Three Gorges University The No.780 of ShaLong street,

More information

Product data model for PLM system

Product data model for PLM system roduct data model for LM system Li Yumei, Wan Li, Xiong Tifan (National CAD Support Software Engineering Research Center, Huazhong University of Science and Technology, Wuhan 430074) Abstract: roduct lifecycle

More information

Build products with visual solution configuration in an integrated quotation management application.

Build products with visual solution configuration in an integrated quotation management application. Build products with visual solution configuration in an integrated quotation management application. Configuration Lifecycle Management Configuration Lifecycle Management (CLM) is the management of configuration

More information

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method Send Orders for Reprints to [email protected] 254 The Open Cybernetics & Systemics Journal, 2014, 8, 254-258 Open Access A Robustness Simulation Method of Project Schedule based on the Monte Carlo

More information

CRM 2013 Workflows. Description

CRM 2013 Workflows. Description CRM 2013 Workflows What can Workflows do? In CRM 2013, there are four types of Processes that can be created. We are covering Workflows today, but here is a brief explanation of each type. Process category

More information

The IFPUG Counting Practices On-Going Effort in Sizing Functional Requirements. Janet Russac

The IFPUG Counting Practices On-Going Effort in Sizing Functional Requirements. Janet Russac The IFPUG Counting Practices On-Going Effort in Sizing Functional Requirements Janet Russac 2009 IFPUG s method for function point analysis is an ISO standard and must be conformant to ISO/IEC 14143-1:2007.

More information

Using flipped classroom as the teaching mode in a Computer Network course

Using flipped classroom as the teaching mode in a Computer Network course World Transactions on Engineering and Technology Education Vol.12, No.4, 2014 2014 WIETE Using flipped classroom as the teaching mode in a Computer Network course Caiyin Wang, Jianxin Li & Lin Cui Suzhou

More information

Research on Sports Information Technology Education Platform Based on ASP-NET Technology

Research on Sports Information Technology Education Platform Based on ASP-NET Technology Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 2989-2993 2989 Open Access Research on Sports Information Technology Education Platform Based on

More information

Trust but Verify: Authorization for Web Services. The University of Vermont

Trust but Verify: Authorization for Web Services. The University of Vermont Trust but Verify: Authorization for Web Services Christian Skalka X. Sean Wang The University of Vermont Trust but Verify (TbV) Reliable, practical authorization for web service invocation. Securing complex

More information

Real estate investment project risk analysis

Real estate investment project risk analysis Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):1789-1794 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Real estate investment project risk analysis Li

More information

The Design and Improvement of a Software Project Management System Based on CMMI

The Design and Improvement of a Software Project Management System Based on CMMI Intelligent Information Management, 2012, 4, 330-337 http://dx.doi.org/10.4236/iim.2012.46037 Published Online November 2012 (http://www.scirp.org/journal/iim) The Design and Improvement of a Software

More information

RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM IN COLLABORATIVE PLATFORM FOR ENGLISH TEACHING

RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM IN COLLABORATIVE PLATFORM FOR ENGLISH TEACHING Computer Modelling and New Technologies, 2013, vol. 17, no. 3, 93 98 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM

More information

Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory

Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory Contemporary Logistics 11 2013) 1838-739X Contents lists available at SEI Contemporary Logistics journal homepage: www.seiofbluemountain.com Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory

More information

I. INTRODUCTION THE INTELLIGENT TRANSPORTATION MANAGEMENT INFORMATION SYSTEM OF RAILWAY IN CHINA

I. INTRODUCTION THE INTELLIGENT TRANSPORTATION MANAGEMENT INFORMATION SYSTEM OF RAILWAY IN CHINA 39 THE INTELLIGENT TRANSPORTATION MANAGEMENT INFORMATION SYSTEM OF RAILWAY IN CHINA PingHUANG Zhongyr ZHANG Dr. of Eng., Associate Professor Professor Automation System Institute Automation System Institute

More information

Development of a Web-based Information Service Platform for Protected Crop Pests

Development of a Web-based Information Service Platform for Protected Crop Pests Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193

More information

Pattern-based J2EE Application Deployment with Cost Analysis

Pattern-based J2EE Application Deployment with Cost Analysis Pattern-based J2EE Application Deployment with Cost Analysis Nuyun ZHANG, Gang HUANG, Ling LAN, Hong MEI Institute of Software, School of Electronics Engineering and Computer Science, Peking University,

More information