Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Knowledge and Technology》 2010-10
Add to Favorite Get Latest Update

Research on Software Architecture of Food Safety Traceability System Based on Trust Computing

CAO Ting,WANG Yan-xing(College of Computer,Beijing University of Technology,Beijing 100124,China)  
Food safety is currently the focus of attention of the community problems.Food safety is the focus of current social problems concerning people's livelihood and we need to solve it in a timely and secure manner.Currently the existing food safety traceability system only rests on the trale of the information.So the realization of information transmission and circulation of the process that will not be tampering is an urgent problem to resolve.In this paper,taking meat for example,the credibility of the theory is applied to computer software system to work out a third-rate integration of multi-layer software architecture,which opened up a new idea for delivering the information in the food distribution safely and reliably.
【CateGory Index】: TP311.52
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 TAN Liang1,2 XU Zhi-wei1(Institute of Computing Technology,Chinese Academy of Sciences,Beijing100080,China)1(College of Computer,Sichuan Normal University,Chengdu 610066,China)2;Development of the Transitive Trusted Chain Based on TPM[J];Computer Science;2008-10
2 MA Jianping; YU Xiangxuan; HONG Fan; ZHANG Jiangling(Department of Computer Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074 );A COMPLETE NONINTERFERENCE MODEL[J];Chinese Journal of Computers;1997-11
3 Fu,Yinxiang Wang,Zhijie Zhang,Jue (Department of Information Science and Technology, Donghua University, Shanghai, 200051)Fu,Yinxiang Wang,Zhijie Zhang,Jue;A Method of Software Development Based on Component[J];;2006-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 GENG Xiuhua1,HAN Zhen1,JIN Li2,PENG Shuanghe1(1.School of Computer and Information Technology,Beijing Jiaotong University, Beijing 100044,China;2.Department of Computer,Taiyuan Normal University,Taiyuan 030012,China);Application of Trusted Computing Platform in Trust Management[J];Journal of Beijing Jiaotong University;2009-02
2 MA Zhuo,MA Jian-feng,YANG Chao,YANG Li (School of Computer Science & Technology,Xidian University,Xi'an 710071,China);Trusted Network Connect Protocol for Wireless Environment[J];Journal of Beijing University of Technology;2010-05
3 MA Chun-min,KANG Cun-feng,HUANG Xu-dong,ZHENG Xue-ke,YANG Jian-wu,FEI Ren-yuan(College of Mechanical Engineering and Applied Electronics Technology,Beijing University of Technology,Beijing 100124,China);Shaftless Printing Machine Control System[J];Journal of Beijing University of Technology;2010-06
4 LIU Ming-hui1,XIN Yang1,YANG Yi-xian1,LI Zhong-xian1,2(1.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;2.Beijing Research and Development Center,Tianjin National Cybernet Security Limited,Beijing 100088,China);A Card-not-Present Payment System Using Direct Anonymous Attestation Mechanism[J];Journal of Beijing University of Posts and Telecommunications;2008-04
5 HAN Feng-ying1,2,ZHU Cong-xu2,3(1.Changsha Aeronautical Vocational and Technical College,ChangshaHunan410124;2.School of Information Science and Engineering,Central South University,ChangshaHunan410083;3.Guangdong Province Key Lab of Electronic Commerce Market Application Technology,GuangzhouGuangdong510320);Overview on Digital Watermarking Technology[J];Journal of Changsha Aeronautical Vocational and Technical College;2008-02
6 CHEN Luxi(Wuhan University,School of Computer Science,Information Security Department,Wuhan 430079);Non-interference Property Modeling With TCG Trusted Chain[J];Computer Programming Skills & Maintenance;2009-16
7 JIA Qian(Computer College of Wuhan University,Wuhan 430079,China);Component and Software Development Based on Component[J];Computer Knowledge and Technology(Academic Exchange);2007-17
8 GU Da-wei,WANG Yu-hua,HOU Zhi-qiang(College of Information Science and Engineering,Henan University of Technology,Zhengzhou 450001,China);Network Computing Based on the Credibility of Environmental Studies[J];Computer Knowledge and Technology;2009-28
9 WANG Jun-hao1,SUN Qiong-qiong2(1.Department of Computer Science and Engineering,Henan University of Urban Construction,Pingdingshan 467044,China;2.Depart-ment of Computer,Pingdingshan Institute of Education,Pingdingshan 467000,China);Research and Application of Dynamic General Government Portal Platform Based on Component[J];Computer Knowledge and Technology;2010-06
10 CAO Xiao-li(Henan Polytechnic,Zhengzhou 450046,China);Based on DES Encryption Algorithm[J];Computer Knowledge and Technology;2011-02
China Proceedings of conference Full-text Database 3 Hits
1 HE Ming~(1,2) QIU Hang Ping~1 YANG Fei~1 LIU Yong~1 1 PLA Science and Technology University,Institute of Command Automation,Nanjing 210007 2 Information Science and Engineering Institute,Southeast University,Nanjing 210096;Research on Trustworthy Authentication Techniques Based on the Trustworthy Distributed System[A];[C];2008
2 Zhang Fan,Sang Yongxuan,You Lin (School of Communication Engineering,Hangzhou Dianzi University,Hangzhou,310018,China);Transitive Noninterference Model for Integrity[A];[C];2010
3 Xiong WANG,Jiapeng LOU,Yanmei PANG Department of Information Security,BESTI,Beijing,China,100070;Construction of “Network Security” Curriculum Group[A];[C];2011
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 CHEN Huo-wang,WANG Ji,Dong Wei (School of Computer,National University of Defense Technology,Changsha,Hunan 410073,China);High Confidence Software Engineering Technologies[J];Acta Electronica Sinica;2003-S1
2 MENG Qing-shu~1,ZHANG Huan-guo~1,WANG Zhang-yi~1,QIN Zhong-ping~2,PENG Wen-ling~1 (1.School of Computer Science,State Key Lab of Software Engineering,Wuhan University,Wuhan,Hubei 430072,China; 2.School of Software,Huazhong University of Science and Technology,Wuhan,Hubei 430074,China);Designing Bent Functions Using Evolving Method[J];Acta Electronica Sinica;2004-11
3 XIAO Guo-zhen, LU Ming-xin (National Key Lab of ISN, Xidian University, Xi'an 710071);DNA Computation and DNA Cryptography[J];Chinese Journal of Engineering Mathematics;2006-01
4 Li Xiaoyong Shen Changxiang Doctoral Candidate;Information Security Architecture Center,Beijing Jiaotong University,Beijing 100044,China.;Research to a dynamic application transitive trust model[J];Journal of Huazhong University of Science and Technology;2005-S1
5 FANG Yanxiang1,HUANG Tao2(1.College of Information Technical Science,Nankai University,Tianjin 300071;2.College of Electronic Technology,PLA Information Engineering University,Zhengzhou 450052);Design and Implementation of Trusted Startup Process for Linux[J];Computer Engineering;2006-09
6 Tao Renji Chen Shihua (Institute of Software, Academia Sinica);A FINITE AUTOMATON PUBLIC KEY CRYPTOSYSTEM AND DIGITAL SIGNATURES[J];Chinese Journal of Computers;1985-06
7 ZHANG Huan-Guo 1) FENG Xiu-Tao 1) QIN Zhong-Ping 2) LIU Yu-Zhen 1) 1) (State Key Laborary of Software Engineering, College of Computer, Wuhan University, Wuhan 430072) 2) (Department of Mathematics, Huazhong University of Science & Technology, Wuhan 430074 );Research on Evolutionary Cryptosystems and Evolutionary DES[J];Chinese Journal of Computers;2003-12
8 LIN Chuang PENG Xue-Hai (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Research on Trustworthy Networks[J];Chinese Journal of Computers;2005-05
9 TANG Wen, CHEN Zhong (Department of Computer Science and Technology, Peking University, Beijing 100871, China);Research of Subjective Trust Management Model Based on the Fuzzy Set Theory[J];Journal of Software;2003-08
10 FENG Deng-guo (Institute of Software of Academia Sinica,State Key Lab of Information Security,Beijing 100080, China);Status quo and trend of cryptography[J];Journal of China Institute of Communications;2002-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved