Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Electronic Science and Technology》 2010-05
Add to Favorite Get Latest Update

Design and Implementation of a Communications Middleware Platform

Fan Qinggang,Ye Xuemei,Luo Yuanjun(No.401 Department of Teaching Research,The Second Artillery Engineering College,Xi'an 710025,China)  
With the rapid development of informatization,many distributing data management systems have been widely used.Besides their corresponding functions,they are required to be more secure and efficient.An integrated middleware platform is designed and implemented,which is capable of hiding the database from the network and providing secure data communication and interfaces.
【CateGory Index】: TP311.52
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 5 Hits
1 YANG Ni-zhi(Software Institute of Southeast University,Nanjing 210000,China);The Research of Message-Oriented Middleware Applications in Data Interchange[J];Computer Knowledge and Technology;2009-07
2 ZHANG Hua-jie(Zhengzhou,Radio and TV University,Zhengzhou 450002,China);Under the Management of Multi-threaded Database Access Technology[J];Computer Knowledge and Technology;2009-19
3 YANG Yong wei,ZHENG You chai (Xidian Unviersity,Xi′an 710071,China)$$$$;Impletation of Message-oriented Middleware Based on TCP/IP[J];Aeronautical Computer Technique;2002-03
4 CHANG Yu-fen,ZHANG Yu-ping (Dept.of Computer Science & Engineering,Nanjing University of Aeronautics & Astronautics,Nanjing Jiangsu 210016,China);Research on Technology of Middleware[J];Application Research of Computers;2001-10
5 YU Chun-xia,XIE Chuan,LIU Zhi-feng (College of Mechanical Engineering and Applied Electronics Technology,Beijing University of Technology,Beijing 100022,China);Techniques on access database of ORACLE in VC++[J];Machinery Design & Manufacture;2008-08
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG An-qin,ZHOU Xiao--feng (School of Computer & Information Enginering, Hehai University, Nanjing 210098,China);THE INVESTIGATION OF MIDDLEWARE BASED ON COMPONENT TECHNOLOGY[J];Journal of Anhui Normal University(Natural Science);2004-04
2 XU Ji-bin~1,YE Zhen~1,CAI Min~2(1.School of Computer and Information,Hefei University of Technology,Hefei 230039,China;2.Department of Computer Science and Technology,Chaohu College,Chaohu 238000,China);A Key Management Scheme Based on HASH Function[J];Journal of Anhui Normal University(Natural Science);2006-04
3 LIU Xiao-chuan1,2,HOU Zheng-feng1 (1.School of Computer & Information,Hefei University of Technology,Hefei 230009,China;2.Anhui Vocational and Technical College,Hefei 230036,China);A Algorithm of the Subliminal Channel Safety Construction in the ElGamal Signature[J];Journal of Anhui Normal University(Natural Science);2007-06
4 LI Ming(Department of Basic Science, Anhui Vocational and Technical College of Communications, Hefei 230051,China);On the establishment of practical and comprehensivenetwork security system[J];Journal of Anhui Technical College of Water Resources and Hydroelectric Power;2004-04
5 DAI Zi-bin,SUN Wan-zhong,ZHANG Yong-fu(PLA Information Engineering University,Zhengzhou 450004,China);Design of data encryption standard algorithm IP-core[J];Semiconductor Technology;2003-05
6 WANG Xiao-ni~1, YANG Gen-xing~2 (1.Division of Basic Courses,Beijing Institute of Machinery,Beijing 100085,China;2. Computing Centre, Beijing Institute of Machinery, Beijing 100085, China);Research of a dynamic password authentication system based on challenge/response authentication[J];Journal of Beijing Institute of Machinery;2003-04
7 WANG Xue-yan, CHEN Qian-bin (Mobile Communication Engineering Research Center,CUPT,Chongqing 400065,China);HASH Function Implementation of the Integrity of Data in WAP's WTLS[J];Journal of Chongqing University of Posts and Telecommunications;2002-02
8 TONG Guang-cai (Chongqing Jiaotong University, Chongqing 400074, P. R. China);Application of nesting encryption technologies in SET[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-S1
9 LIU Feng (Xiamen Station of Remote Education, Tsinghua University, Xiamen 361012, China);Security of block algorithm and intensified design[J];Journal of Chengdu University of Information Technology;2003-04
10 LIAO ZHI-qiang,CHEN Yun(College of Communication & Information Engineering,UESTC,Chengdu 610054,China);An FPGA implementation of IDEA[J];Journal of Chengdu University of Information Technology;2006-02
China Proceedings of conference Full-text Database 6 Hits
1 Zhang ZhaoXin, Fang BinXing, Zhang HongLi (Computer Science Of Harbin Institute Of Technology 150001);Security Analysis of Authentication Protocol for SIP Network Based on BAN Logic[A];[C];2006
2 HUANG Feng-yun, LU Xiao-hai, MO Yi-min (School of Electro Mechanical Engin. , Wuhan Univ. of Technology,Wuhan 430070,China; NSFOCUS(Beijing)Ltd. ,Beijing 100089, China);The Safety Leak and Solution of MIDAS Multi-tier Application Base on SOCKET Connection[A];[C];2005
3 SUN Ying-ming, TANG Dan, ZHANG Hai, CHEN Yu-xiao (Institute of Electronic and Engineering, CAEP, Mianyang, Sichuan 621000, China);A long-distance Internet safety data transmission solution based on ARM platform[A];[C];2006
4 Li Haiyan Liu Liandong Yu Bin Institute of Electronic Technology, Information Engineering University, Zhengzhou, 450004, China;Research and Design of Key Agreement Scheme in Bluetooth[A];[C];2008
5 XUE Weimin~1 LIN Benjing~2 1 Department of Computer Science & Technology,Tsinghua University,Beijing 100089 2 College of Information,Beijing University of Chemical Technology,Beijing 100029;Research of Wireless Network Security Based on Status Authentication[A];[C];2008
6 Jiang yanjie,Cai hongliu,li dong Information Department,The Academy of Armored Forces Engineering,Beijing 100072;Research and Realization of Key Management In Group Communication of WirelessNetwork[A];[C];2009
【Secondary Citations】
Chinese Journal Full-text Database 5 Hits
1 YAN Ruxiang (28th Research Institute of MEI, Nanjing 210014 ).;Analysis of the Connections Between VC++ and Oracle Database[J];COMPUTER ENGINEERING;2000-09
2 LUO Xiaobin1,DONG Shoubin1,XU Hao2,ZHANG Ling1 (1.Network Research Center,South China Univ.of Tech.,Guangzhou 510641; 2.Research Institute of Computer Application,South China University of Technology, Guangzhou 510641);The Technology and Application of Asynchronous Messaging Based on JMS[J];Computer Engineering;2002-12
3 CHENG Gong,YANG Dian fu (Dept of Automation, Tsinghua University, Beijing 100084,China);Comparsion and Selection about Visiting Technology of Several Database in VC[J];Application Research of Computers;2002-02
4 FU Chang-wei, BI Yu-shen, HAN Ai-rong (Dept. of Computer Sci. and Techn., Liaoning Univ. of Petroleum & Chemical Techn., Fushun 113001,China);Application of JMS in E-commerce Based on J2EE Architecture[J];Microcomputer Development;2004-04
5 HU Huai-yong,HU Yong-jun,GONG Wei-rong (Information Engineering Faculty,China University of Geosciences,Wuhan430074China);Discussion on Several Technologies of Accessing Oracle Database[J];Modern Computer;2002-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved