期刊文献+

图书馆网络安全技术研究 被引量:2

A Study on Network Security Technology for Library
下载PDF
导出
摘要 针对当前对图书馆计算机网络系统进行攻击的各种手法以及网络安全问题所导致的严重后果,通过分析计算机网络系统中的各种安全威胁和网络威胁的起因,给出了实现计算机网络安全的几种技术方法,并对这些技术的应用和发展趋势进行了讨论。 Aiming at avoiding the attacks to the computer network system of library and the disasters caused by the net security problem, this paper analyzed the masons of various threats to the safety of the computer operation system and the computer network. Several technical methods which ensure the realization of network safety were presented, and the further applications and developments of these techniques were discussed as well.
作者 陈健
出处 《四川文理学院学报》 2008年第5期46-48,共3页 Sichuan University of Arts and Science Journal
关键词 网络安全 防火墙 停火区 network security firewall demilitarized zone
  • 相关文献

参考文献4

  • 1AI - Shaer E. Active Management Framework for Distributed Multimedia Systems [ J ]. Journal of networks and Systerns Management, 2000 (8) : 49 - 72.
  • 2梅森.Cisco安全虚拟专用网络[M].北京:人民邮电出版社.2005:75-80.
  • 3卡特.Ciseo安全入侵检测系统(CSIDS)[M].北京:人民邮电出版社,2005:56-61.
  • 4夏正友,张世永.主动网络安全结构模型设计(英文)[J].软件学报,2002,13(8):1352-1360. 被引量:9

二级参考文献15

  • 1[1]Tennenhouse, D., Wetherall, D. Towards an active network architecture. In: Proceedings of the Multimedia Computing and Networking 1996. San Jose, CA, 1996.
  • 2[2]O'Malley, S.W., Peterson, L.L. A dynamic network architecture. ACM Transactions on Computer Systems, 1992,10(2):110~143.
  • 3[3]A Security Working Group. 2000. http://www.choices.cs.uiuc.edu/Security/seraphim/May2000/SecurityArchitecture.pdf.
  • 4[4]Lindell, B. Active networks protocol specification for hop-by-hop message authentication and integrity. April 2000. http://www.isi.edu/abone/Documents/Ossec.txt.
  • 5[5]Campbell, R.H. Liu, Zhao-yu. Dynamic interoperable security architecture for active network. IEEE OPENARCH 2000, Israel, March 2000. 32~41.
  • 6[6]Liu, Zhao-yu, Naldurg, P. Agent based architecture for supporting application level security. In: Proceedings of the DARPA Information Survivability Conference and Exposition. Hilton Head Island, 2000. 129~143.
  • 7[7]Liu, Zhao-yu, Campbell, R.H. Securing the node of active networks. In: Hariri, S., Lee, C., eds. Active Middleware Services. Boston, MA: Kluwer Academic Publishers, September 2000.
  • 8[8]Alexander, D.S. Safely and security of programmable network infrastructures. IEEE Communication Magazine, 1998,36(10): 84~92.
  • 9[9]Alexander, D.S. Security in active networks. LNCS 1603, 1999.
  • 10[10]Smith, J.M. Activating networks: a progress report. Computer, 1999,32(4):32~41.

共引文献8

同被引文献9

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部