BS EN 50710-2021Requirements for the provision of secure remote services for fire safety systems and security systems
BS EN 50710-2021Requirements for the provision of secure remote services for fire safety systems and security systems...
Security Analysis of Broadcaster Group Key Exchange Protocols
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper....
Analysis on mechanism of land resource security
This paper probes into the relationship among individual benefits, benefits of the country, common benefits of all humans in land use and land resource security. The following balanced land use model is proposed: the harmonious and interactive relationship between man and nature, two main bodies of land ecological system, constitutes the mechanism of land resources security. The feedback relationship between man and nature is the basis for the land resources security and the core is the relationship among people established for the benefit equilibrium in land use. The conflicts, in land use stem from the rarity of land resource and the solution to those conflicts in harmony helps land resource security....
Raltitrexed arterial infusion chemotherapy analysis
Objective:The aim of this study was to analysis raltitrexed by the safety and ef icacy of intra-arterial infusion chemotherapy. Methods:Forty-seven cases in dif erent parts of cancer patients, interventional methods, based on digital subtraction angiography (DSA) prompt, raltitrexed-based chemotherapy, the tumor nourish artery infusion chemotherapy. Patients with postoperative chemotherapy side ef ects and complications, and ef icacy assessments. Results:Forty-seven patients, 2 patients had II-III degree of bone marrow suppression, the rate was 4.26%, 34 cases of I to II degree gastroin-testinal reactions, 1 case of grade III gastrointestinal reactions, the incidence of 2.13%, and 1 case mild diarrhea. I degrees or more chemotherapy-related adverse reactions did not occur in this group of patients. Al patients received at least 2 times arterial infusion chemotherapy, complete remission (CR) 3 cases, partial remission (PR) 11 cases, stable disease (SD) 17 cases, disease progression (PD) 6 cases, total ef ective rate of treatment 87.23%. Conclusion:Raltitrexed for intra-arterial chemotherapy is safe and ef ective. However, due to the smal number of this group of patients, time is short, its safety, ef-ficacy and long-term ef icacy needs further observation and validation....
Analysis of Hot Topics in Cloud Computing
In the field of cloud computing, topics such as computing resource virtualization, differences between grid and cloud computing, relationship between high-performance computers and cloud computing centers, and cloud security and standards have attracted much research interest. This paper analyzes these topics and highlights that resource virtualization allows information services to be scalable, intensive, and specialized; grid computing involves using many computers for large-scale computing tasks, while cloud computing uses one platform for multiple services; high-performance computers may not be suitable for a cloud computing; security in cloud computing focuses on trust management between service suppliers and users; and based on the existing standards,standardization of cloud computing should focus on interoperability between services....
A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process
The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current state of network. These disadvantages always put the whole network security management at high risk. This paper establishes a simulation environment, captures the alerts as the experimental data and adopts statistical analysis to seek the vulnerabilities of the services provided by the hosts in the network. According to the factors of the network, the paper introduces the two concepts: Situational Meta and Situational Weight to depict the total security situation. A novel hierarchical algorithm based on analytic hierarchy process (AHP) is proposed to analyze the hierarchy of network and confirm the weighting coefficients. The algorithm can be utilized for modeling security situation, and determining its mathematical expression. Coupled with the statistical results, this paper simulates the security situational trends.Finally, the analysis of the simulation results proves the algorithm efficient and applicable, and provides us with an academic foundation for the implementation in the security situation....
Scenario simulation of water security in China
Limited water resources, increasing demand, low use efficiency, and serious pollution result in severe water resource difficult in China. The evaluation of addressing water problems and the search for effective countermeasures that ensure sustainable water use are key to China's sustainable development. The "compound water security" consists of food security, life security, environmental security, and economic security. By establishing a conceptual model, the water security of China has been simulated in terms of four scenarios called BAU(the business-as-usual scenario), TEC(the technology and economics scenario), IVL(the institution, values, and lifestyles scenario) and TSD(toward sustainable development) in this paper. The results indicated that water crises, especially water shortages, are being experienced now and will continue to do so for a relatively long time in China and that it is possible to reach a basic balance between supply and demand of water and grain under the TSD developing pattern by a series of approaches including technological innovation, policy adjustments, and behaviour inducement....