Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA》 1996-01
Add to Favorite Get Latest Update

Turing Machine of a Security System

Qin Zhiguang;Liu Jinde(Microcomputer Institute,UEST of China Chengdu 610054)  
in the open network environment based on trader,the interoperobility of heterogeneous computer heterogeneous data bases and heterogeneous networks can be implemented,which works in client/server model.The system may subject to every kinds of attacks and illegal operations.Security is very important in open network environment.A security system is introduced for open network environment,and a turing machine of the security system is presented in this peper.The turing machine simulates the security system and describe the states transition of the security system and supplies a theory basis for designing architecture of the security system.
【Fund】: 电子部预研基金
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 3 Hits
1 WANG Lu, QIN Zhi-guang (School of Computer Science and Engineering,UEST of China,Chengdu 610054,P.R.China);Turing machine of production honeynet system[J];Journal of Chongqing University of Posts and Telecommunications;2004-03
2 MA Xin-Xin;CHEN Wei;QIN Zhi-Guang College of Computer Science and Engineering, UESTC of China, Chengdu 610054;Definite State Machine of Honey Pot System Model[J];Computer Science;2005-11
3 Wen Jinghua1 Li Xiang2 1(Information Institute, Guizhou Financial Institute, Guiyang Guizhou 550004, China) 2(Institute of Software and Theory, Guizhou University, Guiyang Guizhou 550025, China);A PETRI NET MODEL OF OPEN SECURITY SYSTEM[J];Computer Applications and Software;2005-10
【Citations】
Chinese Journal Full-text Database 1 Hits
1 Tang Xufei & Liu Jinde;Service Trading in Open System[J];Computer Science;1995-04
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 XIAO Jun-mo (Institute of Communication Engineering ICE, PLAUST Nanjing 210007);Extension to Military Security Model[J];Journal of University of Electronic Science and Technology of China;2005-02
2 Qin Zhiguang;Liu Jinde(Microcomputer Institute,UEST of China Chengdu 610054);Secure Interaction Between Client and Server[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1996-01
3 Xiao Junmo (Institute of Communication Engineering, PLA University of Science and Technology, Nanjing 210007,China);Security problems of protection systems with the Petri net[J];Journal of Southeast University (Natural Science Edition);2003-06
4 ZHOU Mei-jiao, YING Qi-jia, SUI Guo-rong(College of Optical and Information Engineering, Shanghai University of Science and Technology, Shanghai 200093, China);Application of Comprehensive Industry Monitoring and Control Network in Power System[J];Power Engineering;2005-04
5 JIANG Hua-lin 1, LI Zhi-min 1, LI Li-xin 1, YANG Zhong 2, WANG Hong-jian 1 (1.Key Laboratory of Opto-electronic Technology and System under the State Ministry of Education, Chongqing University, Chongqing 400044,China; 2.Library of Chongqing University, Chongqing 400044,China);Design and Realization of Database Security Proxy Based on MIDAS[J];Journal of Chongqing University(Natural Science Edition);2003-07
6 KE Dong-zhong 1, ZHOU Li 1, ZHENG Ying-wen 1, CAI Xiao-zhen 2, CHEN Lan-sheng 2 (1. Institute of Automation, Fuzhou University, Fuzhou, Fujian 350002, China; 2. College of Information Science and Technology, Fuzhou University, Fuzhou, Fujian 350002, China);A describing tool TL for special language[J];Journal of Fuzhou University(Natural Sciences Edtion);2003-04
7 Mai Yonghao Liu Zhijun Xue Qin (Hubei Police Officer College,Wuhan 430034,China);A study on the techniques of intrusive-detection in electronic policing[J];Journal of Hubei Public Security College;2005-05
8 LI Gui lian (Dept. of Mathematics, Taiyuan University of Technology, Taiyuan 030024, China);The Equivalence Relation Between Discrete Event Systems[J];Journal of North China Institute of Technology;2001-05
9 FAN Zhong-jun,WANG Bo,YU Ling (College of Management,University of Shanghai for Science and Technology,Shanghai 200093,China);Finite automata model for one type of DNA computing system[J];Journal of University of Shanghai For Science and Technology;2004-04
10 DUAN Li-yan (Department of Computer Science,South China Normal University,Guangzhou 510631,China);AUTHENTICATION OF WEB PAGE[J];Journal of South China Normal University(Natural Science);2002-01
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHOU Wei dong,SHEN Yuan long,LI Jie (Department of Electronic Engineering,NJUPT 210003,P.R.China);Parallelizing SDP Algorithms for Reliability Analysis[J];Journal of Chongqing University of Posts and Telecommunications;2003-01
2 SU Xian-li (College of information science & engineering,Bohai university jinzhou 121000,China);The Design of a System of defence Based On Linux honeynet[J];Journal of Changchun Teachers Coliege;2005-12
3 Qin Zhiguang;Liu Jinde(Computcr Scuebce and Enginecring College ,UEST of China Chengdu 610054);A Security Domain Association of a Global Security System in ODP[J];;1995-05
4 Qin Zhiguang;Liu Jinde(Inst.of Microcomputers,UEST of China Chengdu 610054);Topology of the Global Security System for ODP Environment[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1995-06
5 Qin Zhiguang;Liu Jinde(Microcomputer Institute,UEST of China Chengdu 610054);Secure Interaction Between Client and Server[J];JOURNAL OF UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA;1996-01
6 Ruan Canhua Liang Zhong;Research on Honeynet Based on Intranet[J];Computer Study;2008-02
7 ZHANG Qing-jun, LIU Xiao-qing, CUI Feng-yun (School of Information Science & Technology, SWJTU, Chengdu 610031, China);Design and Implementation on the Study Honeynet[J];Computer Knowledge and Technology;2008-12
8 TANG Shi-wei~1,LIANG Xing-zhu~1,SI Guo-hai~2(1.Computer Science and Engineering College,Daqing Petroleum Institute,Daqing,Heilongjiang 163318,China;2.Scientific Research Department,Daqing Petroleum Institute,Daqing,Heilongjiang 163318,China);Design and implementation of production honeynet based on virtual machine technology[J];Journal of Daqing Petroleum Institute;2005-05
9 XIE Qiong 1,XIA Yu 2 (1 School of Economics and Management,GUT,Guiyang 550003,China; 2 Economic lnformation Center of Guizhou Province,Guiyang 550003,China);Solution for the Shortage of IP Address Resource[J];Journal of Guizhou University of Technology(Natural Science Edition);2001-02
10 HUAING Zhi-qiang, SU Ying (Department of Computer Science and Engineering, North China Electric Power University, Baoding 071003, China);Application of FA in Design of Automatic Control Software[J];Journal of North China Electric Power University;2002-01
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 ZENG Zhi-jun, TANG Wen-sheng, YIN Dan (Computer Education Department, Hunan Normal University, Changsha 410081, China);The Research of Entrap Worm Virus Based on The Intrusion Detection System[J];Computer Knowledge and Technology;2009-21
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved