5 resultados para Dynamic security assessment
em Cambridge University Engineering Department Publications Database
Resumo:
Carbon fibre-epoxy composite square honeycombs, and the parent composite material, were tested in quasi-static compression at a strain rate of 10 -3 s -1 and in dynamic compression at strain rates of 10 3-10 4 s -1 using an instrumented Kolsky bar arrangement. Taken together, these tests provide an assessment of the potential of this composite topology for use as a lightweight sandwich core. The honeycombs had two relative densities, 0.12 and 0.24, and two material orientations, ±45° and 0/90° with respect to the prismatic, loading direction of the honeycomb. Honeycomb manufacture was by slotting, assembling and bonding together carbon fibre/epoxy woven plies of composite sheets of 2 × 2 twill weave construction. The peak value of wall stress in the honeycombs was about one third that of the parent material, for all strain rates. An elastic finite element analysis was used to trace the source of this knock-down in strength: a stress concentration exists at the root of the slots and leads to premature failure by microbuckling. Shock-wave effects were evident at impact velocities exceeding 50 ms -1 for the honeycomb of relative density 0.12. This was traced to stubbing of the buckled cell walls against the face of the Kolsky bar. © 2011 Elsevier Ltd. All rights reserved.
Resumo:
Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing 'raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents. © 2012 IEEE.