A New Architecture of Grid Security System Construction

Author(s):  
MingChu Li ◽  
Yongrui Cui ◽  
Yuan Tian ◽  
Dong Wang ◽  
Songyuan Yan

2014 ◽  
Vol 889-890 ◽  
pp. 671-675 ◽  
Author(s):  
Jun Jin Yang ◽  
Cheng Hua Fu ◽  
Zi Qi Dong

This paper presents a remote security system based on the Internet of things. The system uses S3C2440 as the control core, Linux operating system as the software platform, combined with remote security system construction of GPRS communication technology. The system introduces V4L2 camera video capture process based on Linux operating system, the GPRS module alarm information sending and receiving process, and the project of Android platform video monitoring software. At last, experiments show the system can monitor designated area. When meeting a critical situation,it will automatically alarm. It is of far-reaching significance.



2011 ◽  
Vol 63-64 ◽  
pp. 21-24
Author(s):  
You Chan Zhu ◽  
Xiao Fang Zhang

As the development of network the grid will be widely used. To choose a suitable authentication mechanism in a large grid is very important. Identity authentication is one of the important mechanisms that can achieve grid security. It is the first line in the grid applications. It is also a portal in the security system. In the light of the advantages and disadvantages of PKI and ID-PKI, this paper provides a new technology. Presently, PKI and ID-PKI authentication technology is a popular authentication technology. This technology uses the identity certification to reduce the overhead in the domain, and uses CA authentication between domains to guarantee the security of the system.



2010 ◽  
Vol 219 (6) ◽  
pp. 062058 ◽  
Author(s):  
Andrew McNab ◽  
Yibiao Li


1970 ◽  
Vol 7 (3) ◽  
Author(s):  
Viktoriia N. Kovalchuk

The regulatory documents regarding the computer training rooms and information communication technologies in respect to the information safety are being analyzed in the given paper. The model of information security system of the computer training complex is developed. In particular there are considered the requirements to the security system construction, its functioning and the stages of the lifecycle. The analysis of typical risks for the information resources is conducted, the main methods of their information security are offered.



2005 ◽  
Vol 35 (9) ◽  
pp. 827-834 ◽  
Author(s):  
Andrew McNab


2013 ◽  
Vol 361-363 ◽  
pp. 2276-2281
Author(s):  
Xue Ming Cao ◽  
Chen Mei Jing ◽  
Xiao Dan Zheng

As an important part of the security system in a civil aviation airport, Airport Perimeter Security System construction has been paid universal attention by airport authorities. Sensor fencea novel, low-cost, low maintenance system that may be used on new or existing fences that results in an improved capability to detect, locate and classify intruders. By reviewing the concept and application trends of Internet of Things, features and applicability of different types of the airport perimeter security system are summarized. The Internet of Things is a kind of new technology that sensors and existing internet are integrated based on the technologies, such as RFID, wireless data communications. In this paper, the third generation of airport perimeter security system based on Internet of Things is proposed and designed.



Author(s):  
Nong Xiao ◽  
Xiaonian Wu ◽  
Wei Fu ◽  
Xiangli Qu


Sign in / Sign up

Export Citation Format

Share Document