2018
DOI: 10.4018/ijdcf.2018010102
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Security Strategy for Message-Oriented Middleware

Abstract: This article explores a method to solve the security problems such as limited single-server processing power and single point of failure, and so on, a newly designed and developed Message-Oriented Middleware that supports clustering features. By improving the traditional reverse proxy cluster system, Message-Oriented Middleware has been made more applicable to message transmission services. A method of dynamic load balancing and load transfer was based on a variety of factors that was also designed according t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…There are also many shortcomings in the existing criminal legal system for regulating telecom fraud, and there is still a possibility that telecom fraud will further intensify. The high incidence of telecom fraud causes both personal property and mental losses [5] and also seriously affects the harmony and stability of society [6]; therefore, the detection, identification and prevention of electronic fraud is particularly important. With the development of artificial intelligence, machine learning and other technologies, more and more methods have been applied in the detection and identification of telecom fraud [7].…”
Section: Introductionmentioning
confidence: 99%
“…There are also many shortcomings in the existing criminal legal system for regulating telecom fraud, and there is still a possibility that telecom fraud will further intensify. The high incidence of telecom fraud causes both personal property and mental losses [5] and also seriously affects the harmony and stability of society [6]; therefore, the detection, identification and prevention of electronic fraud is particularly important. With the development of artificial intelligence, machine learning and other technologies, more and more methods have been applied in the detection and identification of telecom fraud [7].…”
Section: Introductionmentioning
confidence: 99%