Putting the above method into the cutting excavation of the highway medium-length blasting considering the blasting environments, the designing and construction of the current situation, by the method of giving marks, combining the relative weights of safety assessment gained, through fuzzy comprehensive evaluation, the real safety grade of this project is drawn.
Research of the Safety Critical Technology for High Security Level Operating System
Thirdly, in order to realize information sharing and purview control, we may set different security level according to different information style, then we ratiocinate operation purview of leader and leaguer, and establish math modeling.
According to the access privilege of roles and the security level of features,the feature-based genus reduction and continuous multi-resolution model was put forward,and record metric α was defined to control assembly models with different resolutions achieved by different roles.
Onthe basis of stope roof safety classification criterion for metal mines,a back-propagation(BP) neural network model was established for recognition of the safety classes with artifi-cial neural network,and has been successfully applied to the classification of two stopes.
On the basis of analyzing factors which influence the stability of stope roof, the article sums up the related evaluating criterion, and carries out the stope roof safety classification of underground mines with application of the basic classifying method, artificial neural network, and analyzing method of grey relevance as well.
By applying the fuzzy theory to evaluate the safety about foundation excavation of subway stations,it may conclude with the safety classification,it becomes more evident whether the accidents in foundation excavation of subway stations will appear or not,then improvement can be made,based on the evaluation situation.
The author mainly realized the method of generating the large random numbers and judging the prime number using Lehmann means,then three pairs of secure key with different lengths (256 bits,512 bits,1024 bits) was generated to meet the demand of different security grade.
Through the analysis of the safe protocol about IPSec, this paper studies the VPN`s security based on the IPSec and how to structure the security and reliable internal network user the external network,then makes the campus net use the unreliable publicly-used internet to work as the internet medium, so as to realize the security of the specified internet and improve the net`s security grade, having a certain practicability.
After introducing the significance of studying the security of digital signature and blind signature, giving the concepts and definitions related which are regarded as standards at present, this paper, provides a detailed analysis of the security of the schemes in the different security grade, and then it presents the random oracle model and come to a more general conclusion than in bibliography .
To enhance security level, public key cryptosystem is utilized to replace traditional watermark key.
It can achieve the perfect security level equal to one-time pad with much lower energy consumption; moreover, it can be proved to resist the attack of node capture.
The result proves that the reconfigurable AES system is flexible, lower cost and high security level.
The new scalar multiplication has the same security level and computation amount with protected binary scalar multiplication (PBSM) against side channel attack, and has the advantages of higher security and little memory needed.
In the concrete operational semantics each value is annotated by a security level dynamically taking into account both the explicit and the implicit information flows.