Security Model Based on Network Business Security
|
|
|
- Jacob Shepherd
- 10 years ago
- Views:
Transcription
1 Security Model Based on Network Business Security Wu Kehe, Zhang Tong, Li Wei, Ma Gang Department of Computer Science and Technology North China Electric Power University Beijing, China
2 Abstract Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business.
3 I. INTRODUCTION II. CONCEPT OF NETWORK BUSINESS SECURITY III. DESCRIPTION OF CONCEPT BASED ON NETWORK IV. MODEL OF NETWORK BUSINESS SECURITY V. CONCLUSION
4 Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security field after sea, land, air and space. I. INTRODUCTION
5 Existing Theory of Information Security System
6 First of all, this paper defines the "network business" concept. Network business means enterprise management business or controlling process of Production Automation System running on network. It can be further described as follows: II. CONCEPT OF NETWORK BUSINESS SECURITY
7 1) It is composed of function program running on network platform, realizing the enterprise management business processes and production control logic. 2) In the network environment, staff work in accordance with logic and rhythm of business management software, or in accordance with process of control logic, which can constitute the realization of the network business. 3) From the computer network system level, network business is composed of network process set, data sets and process operation sequence set. Based on the analysis of network business s concept and features, "network security" is defined as follows: network security means the reliability, stability and real-time of business running on the network, the continuity of business processes and business operation s confidentiality and non-repudiation.
8 BUSINESS SECURITY Enterprise Information Network is not only the platform for information sharing and information exchanging, but also the platform for enterprise business running on and collaborative operation. Therefore, the Enterprise Information Network security is not only to protect the security of data in network, but also to protect the security of business running on network. III. DESCRIPTION OF CONCEPT BASED ON NETWORK
9 The Information Security System Based on Data,Network and Network Business
10 According to the definition of network business and network business security in this paper, we can conclude that network business is composed of the network process sets, data sets and process operation sequence sets. Network business security is the security of network process sets and data sets, more precisely, is the security of network processes running and writing operation on data sets. According to the above description of network business and network business security, this paper describes the network security model specifically as follows: IV. MODEL OF NETWORK BUSINESS SECURITY
11 a) Process Set: P={p0,p1,p2,;,pn}. pirp, is a process running on Enterprise Infromation Network. b) Data Set: D={d0,d1,d2,;,dm}. djrd$ is the data which processes access to. c) Access Set: F={f0,f1,f2,;,fn}. firf, fi=f(p,d). f(p,d) means the model of process p access to data d. Model Description
12 e) Business Set: B= (P+,D+,F+,S). A business is composed of all of process which can finish the business, all of data which the business needs, the access property of processes access to data and ordered sequence between these processes. All of businesses compose the whole network application system which the model defendes.
13 According to the above description of network business and network business security, this paper abstracts the following two properties: Property 1: The defense of data is the defense of writing operation on data, the defense of reading operation on data is not necessary. Property 2: The right ordered sequence between processes which network businesses needed must not be changed. According to the above two properties, the model constraint can be described as follows: Model Constraints
14 For Property 1: This paper defines pclass(p) as the access class of process p, dclass(d) as the access class of data d. Property 1 can be described as: only if the access class of process p is higher than the access class of data d, process p can write data d. The security formula is: For all prp$drd if wrf(p,d) then pclass(p)>=dclass(d) (1) For Property 2: For any business b, the ordered sequence between processes which business b needs must not be changed. T he security formula is: For all brb S=G(P+)=(P1 + $P2 +,;,Pk +) (2) 3) Definition of Security Status For each business, the all processes and all data must meet the f(p,d) and G(P+) constraint, so we think the business is safe. If all of businesses in the network system is safe, then the application system in network is safe.
15 On the basis of research on actual needs and current application status of Enterprise Information System network security defense, according to the key points of Enterprise Information System network defense, this paper has proposed the network business security concept by theoretical study and research on information security, dividing protection object of information security into data security, network security and network business security. New information security concept considers network business security as an important protection object in Enterprise Information Network, well explaining special problems in Enterprise Information Systems. This paper specifically addresses the meaning of network business security and gives the formal description of network business security model, providing theoretical basis for security development and planning of Enterprise Information System. V. CONCLUSION
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China
A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China Zhongqiang Liu 1, Kaiyi Wang 1*, Shufeng Wang 1, Feng Yang 1 and Xiandi Zhang 1, 1 Beijing Research Center for
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
A Framework of Information Management System for Construction Projects
A Framework of Information Management System for Construction Projects Ma Zhiliang and Qin Liang Department of Civil Engineering, Tsinghua University, Beijing 100084 ([email protected]; [email protected])
HUMAN-COMPUTER INTERFACE DEVELOPMENT OF WIRELESS MONITORING SYSTEM BASED ON MINIGUI
HUMAN-COMPUTER INTERFACE DEVELOPMENT OF WIRELESS MONITORING SYSTEM BASED ON MINIGUI Zhihua Diao 1, Chunjiang Zhao 2,1, Xiaojun Qiao 2,*, Cheng Wang 2, Gang Wu 1, Xin Zhang 2 1 University of Science and
Demand Forecasting Optimization in Supply Chain
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V52.12 Demand Forecasting Optimization
Operation and Maintenance Management Strategy of Cloud Computing Data Center
, pp.5-9 http://dx.doi.org/10.14257/astl.2014.78.02 Operation and Maintenance Management Strategy of Cloud Computing Data Center Wei Bai 1, Wenli Geng 1 1 Computer and information engineering institute
Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine
Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine Qinghua Han, Shujun Li*, ifan Li, Jin Wang, Jiwei Ma, Donglin Zhao Chinese Academy of Agricultural Mechanization
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA) Wei Chen, Jin-cheng Zhang, and Yu-quan Jiang Nanjing Audit University, Nanjing, Jiangsu 210029, China [email protected]
On the Development of Web-based Distance Physical Education
SHS Web of Conferences 19, 02005 (2015) DOI: 10.1051/ shsconf/2015190200 5 C Owned by the authors, published by EDP Sciences, 2015 On the Development of Web-based Distance Physical Education Shaohui Yuan,
Studying on Construction Programs of the Platform of Primary Products Marketing
Studying on Construction Programs of the Platform of Primary Products Marketing Gang Lu 1,Peng Lu 2,Cuie Liu 3 1,3 School of Management and Engineering, Shijiazhuang University of Economics, Shijiazhuang,
The study on the Human Resource Management of the Logistics Enterprises Based On the Competency Model
, The study on the Human Resource Management of the Logistics Enterprises Based On the Competency Model You Chun Li Yanping School of Economics and Management Wu Han University,Luojia Mountain, Hubei,P.R.China,430072
Design of Data Archive in Virtual Test Architecture
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei
A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN
A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN Hui Li 2,1, Zetian Fu 1,2,*, Yan Li 3, Jian Zhang 2,1 1 College of Engineering, China Agricultural University, Beijing, China, 100083;
PERSONALIZED WEB MAP CUSTOMIZED SERVICE
CO-436 PERSONALIZED WEB MAP CUSTOMIZED SERVICE CHEN Y.(1), WU Z.(1), YE H.(2) (1) Zhengzhou Institute of Surveying and Mapping, ZHENGZHOU, CHINA ; (2) North China Institute of Water Conservancy and Hydroelectric
A Case Study of Question Answering in Automatic Tourism Service Packaging
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question
Food Safety Control from the Perspective of Supply Chain
International Conference on Education Technology and Economic Management (ICETEM 2015) Food Safety Control from the Perspective of Supply Chain Weiyan Xie Guangxi Vocational College of Technology and Business,
Comparison Control Strategies for ISG hybrid electric vehicle. Hailu Tang 1, a
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Comparison Control Strategies for ISG hybrid electric vehicle Hailu Tang 1, a School of Automotive Engineering,Wuhan University
Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net
Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Peigen Li, Ke Shi, Jie Zhang Intelligent Manufacturing Lab School of Mechanical Science and Engineering Huazhong University of Science
Network Attack Platform
Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute
Supply Chain Quality Management Based on Information Asymmetry
Supply Chain Quality Management Based on Information Asymmetry Jianhua Zhao 1, Yue Hu 2, Yi Wang 3 College of Economic and Management, China Three Gorges University, Yichang Hubei Province, China 443002
How to use Ez Trade Builder
How to use Ez Trade Builder If you are an experienced options trader or just learning how to trade options, the right tools are critical to becoming profitable and minimizing your risk. This is a very
An Advanced Commercial Contact Center Based on Cloud Computing
An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
Enterprise Architecture in Banking
Enterprise Architecture in Banking By Clive Finkelstein Contents Enterprise Architecture in Banking... 1 Contents... 1 Introduction... 1 Banking Case Study... 1 Strategic Plan was the Catalyst for the
The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
Strategies for Developing a Document Imaging & Electronic Retention Program
Is it okay to destroy the paper source records? Are there any exceptions? Strategies for Developing a Document Imaging & Electronic Retention Program How do we ensure the program will stand up in court?
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
Analysis of China Motor Vehicle Insurance Business Trends
Analysis of China Motor Vehicle Insurance Business Trends 1 Xiaohui WU, 2 Zheng Zhang, 3 Lei Liu, 4 Lanlan Zhang 1, First Autho University of International Business and Economic, Beijing, [email protected]
Cloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
On-line Payment and Security of E-commerce
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,
On the Development of College Student Information Management System
SHS Web of Conferences 17, 02010 (2015) DOI: 10.1051/ shsconf/201517 02010 C Owned by the authors, published by EDP Sciences, 2015 On the Development of College Student Information Management System Anjiang
HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7?
HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7? This document contains introduction to P2ware Project Manager 7 views (P2ware Project Manager 7 walkthrough) and shows how to create high quality plans
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
A practical and novel standard addition strategy to screen. pharmacodynamic components in traditional Chinese medicine using
Electronic Supplementary Material (ESI) for RSC Advances. This journal is The Royal Society of Chemistry 2015 A practical and novel standard addition strategy to screen pharmacodynamic components in traditional
AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS
AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS Jianping Li Jinli Liu Weixuan Xu 1.University of Science & Technology of China, Hefei, 230026, P.R. China 2.Institute of Policy and Management
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110
Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110 Exam Information Candidate Eligibility: The CyberSec First Responder: Threat Detection and Response (CFR) exam
The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course
The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China
Statistical process control analysis based on software Q-das
American Journal of Theoretical and Applied Statistics 2014; 3(4): 90-95 Published online July 20, 2014 (http://www.sciencepublishinggroup.com/j/ajtas) doi: 10.11648/j.ajtas.20140304.12 ISSN: 2326-8999
UPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
Construction of Library Management Information System
Construction of Library Management Information System Lian-feng Zhang, Rui-jin Zhou, Li-ping Sui, and Guo-qing Wu Henan Institute of Science and Technology Xin-xiang, China [email protected] Abstract. Library
Procedure for Master s Degree Thesis Defense, Graduate Institute of Art History, National Taiwan Normal University
Procedure for Master s Degree Thesis Defense, Graduate Institute of Art History, National Taiwan Normal University Passed at the General Affairs Committee, June 13, 2011 Revisions passed at the General
Research and Implementation of Customizable Dynamic Website Management System
2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research and Implementation of Customizable Dynamic Website Management
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
MODERN EDUCATION TECHNOLOGY WITH CREATIVITY OF CONTINUING EDUCATION
MODERN EDUCATION TECHNOLOGY WITH CREATIVITY OF CONTINUING EDUCATION Luo Long, Liang Zhaohui, Wu Gengsheng, Yang Xiaoqin Continuing Education School of Tsinghua University 100084 Beijing, China [email protected]
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT
DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT Keming Du 1, Zhongfu Sun 1,*, Huafeng Han 1, Shuang Liu 1 1 Institute of Environment and Sustainable Development in Agriculture(IEDA),
Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm
Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm Xi Wang, Chun Wang, Wei Dong Zhuang, and Hui Yang Engineering Collage, Heilongjiang August the First
Introduction to Leadership and Management of. Non-profit Organizations. Syllabus
Introduction to Leadership and Management of Non-profit Organizations Syllabus Spring 2013 School of Social Development and Public Policy Beijing Normal University Li Jing Master of Public Policy, Harvard
A Research and Practice of Agile Unified Requirement Modeling
2009 International Symposium on Intelligent Ubiquitous Computing and Education A Research and Practice of Agile Unified Requirement Modeling Huang ShuiYuan, Duan LongZhen, Xie Jun, Tao JunCai, Chen GuiXiang
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem Sayedmohammadreza Vaghefinezhad 1, Kuan Yew Wong 2 1 Department of Manufacturing & Industrial Engineering, Faculty of Mechanical
Research on small and medium enterprises financing mode based on supply chain finance
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 0, ():88-8 Research Article ISSN : 09-8 CODEN(USA) : JCPRC Research on small and medium enterprises financing mode based
Commercial software development with the help of J2EE architecture and MVC
Journal of The International Association of Advanced Technology and Science Commercial software development with the help of J2EE architecture and MVC Anup Kumar Ranjeeta chauhan 1. Abstract The Java 2
The Need for Intelligent Network Security: Adapting IPS for today s Threats
The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network
Data Mining in the Application of Criminal Cases Based on Decision Tree
8 Journal of Computer Science and Information Technology, Vol. 1 No. 2, December 2013 Data Mining in the Application of Criminal Cases Based on Decision Tree Ruijuan Hu 1 Abstract A briefing on data mining
The Evaluation Model of HD Interactive TV Shopping Service
, pp.175-179 http://dx.doi.org/10.14257/astl.2014.53.38 The Evaluation Model of HD Interactive TV Shopping Service Mengke Yang a, Jianqiu Zeng b Beijing University of Posts and Telecommunications, BUPT,
Project Time Management
Project Time Management Study Notes PMI, PMP, CAPM, PMBOK, PM Network and the PMI Registered Education Provider logo are registered marks of the Project Management Institute, Inc. Points to Note Please
Boosting SMEs with Better and Innovative Financing Services
ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sciences Vol. 4 (2014) No. 2 Boosting SMEs with Better and Innovative Financing Services Wei Liu 1 1 Department of Integrated
BTBU Master of Control Theory and Control Engineering
BTBU Master of Control Theory Control Discipline class: Primary discipline:control Science Sub-discipline: Control Theory Control Sub-discipline code:081101 一 Program Overview The program aims to educate
OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP
OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP Xing Xu School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: [email protected]
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
The Application of 360 +KPI Performance Evaluation Model in Chinese and Western Culture Background
The Application of 360 +KPI Performance Evaluation Model in Chinese and Western Culture Background Wei Tan The Institute of Public Affairs, Chongqing Three Gorges University The No.780 of ShaLong street,
Product data model for PLM system
roduct data model for LM system Li Yumei, Wan Li, Xiong Tifan (National CAD Support Software Engineering Research Center, Huazhong University of Science and Technology, Wuhan 430074) Abstract: roduct lifecycle
Build products with visual solution configuration in an integrated quotation management application.
Build products with visual solution configuration in an integrated quotation management application. Configuration Lifecycle Management Configuration Lifecycle Management (CLM) is the management of configuration
A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method
Send Orders for Reprints to [email protected] 254 The Open Cybernetics & Systemics Journal, 2014, 8, 254-258 Open Access A Robustness Simulation Method of Project Schedule based on the Monte Carlo
CRM 2013 Workflows. Description
CRM 2013 Workflows What can Workflows do? In CRM 2013, there are four types of Processes that can be created. We are covering Workflows today, but here is a brief explanation of each type. Process category
The IFPUG Counting Practices On-Going Effort in Sizing Functional Requirements. Janet Russac
The IFPUG Counting Practices On-Going Effort in Sizing Functional Requirements Janet Russac 2009 IFPUG s method for function point analysis is an ISO standard and must be conformant to ISO/IEC 14143-1:2007.
Using flipped classroom as the teaching mode in a Computer Network course
World Transactions on Engineering and Technology Education Vol.12, No.4, 2014 2014 WIETE Using flipped classroom as the teaching mode in a Computer Network course Caiyin Wang, Jianxin Li & Lin Cui Suzhou
Research on Sports Information Technology Education Platform Based on ASP-NET Technology
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 2989-2993 2989 Open Access Research on Sports Information Technology Education Platform Based on
Trust but Verify: Authorization for Web Services. The University of Vermont
Trust but Verify: Authorization for Web Services Christian Skalka X. Sean Wang The University of Vermont Trust but Verify (TbV) Reliable, practical authorization for web service invocation. Securing complex
Real estate investment project risk analysis
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):1789-1794 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Real estate investment project risk analysis Li
The Design and Improvement of a Software Project Management System Based on CMMI
Intelligent Information Management, 2012, 4, 330-337 http://dx.doi.org/10.4236/iim.2012.46037 Published Online November 2012 (http://www.scirp.org/journal/iim) The Design and Improvement of a Software
RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM IN COLLABORATIVE PLATFORM FOR ENGLISH TEACHING
Computer Modelling and New Technologies, 2013, vol. 17, no. 3, 93 98 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM
Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory
Contemporary Logistics 11 2013) 1838-739X Contents lists available at SEI Contemporary Logistics journal homepage: www.seiofbluemountain.com Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory
I. INTRODUCTION THE INTELLIGENT TRANSPORTATION MANAGEMENT INFORMATION SYSTEM OF RAILWAY IN CHINA
39 THE INTELLIGENT TRANSPORTATION MANAGEMENT INFORMATION SYSTEM OF RAILWAY IN CHINA PingHUANG Zhongyr ZHANG Dr. of Eng., Associate Professor Professor Automation System Institute Automation System Institute
Development of a Web-based Information Service Platform for Protected Crop Pests
Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193
Pattern-based J2EE Application Deployment with Cost Analysis
Pattern-based J2EE Application Deployment with Cost Analysis Nuyun ZHANG, Gang HUANG, Ling LAN, Hong MEI Institute of Software, School of Electronics Engineering and Computer Science, Peking University,
