期刊文献+

浅谈企事业单位上网行为管理 被引量:1

Talking about the Online Behavior Management in Enterprises and Institutions
下载PDF
导出
摘要 从企事业单位访问互联网的信息安全出发,分析了网络时代企事业单位在使用互联网方面面临的问题,提出了企事业单位上网行为管理的对策,以提供一个高效、规范和安全的上网环境。 Starting from the information security of accessing to the Internet in enterprises and institutions, analyzes some problems faced by enterprises and institutions in the application of Internet, and puts forward some countermeasures for the management of online behavior in enterprises and institutions for providing an efficient, standard and safe Internet environment.
作者 李刚
出处 《山西科技》 2013年第1期33-34,共2页 Shanxi Science and Technology
关键词 企事业单位 上网行为 管理控制 enterprises and institutions online behavior management and control
  • 相关文献

参考文献3

二级参考文献13

  • 1崔伟,齐竞艳,蔡圣闻,黄皓.基于IPSec的分布式防火墙安全体系框架[J].计算机工程,2004,30(16):130-132. 被引量:5
  • 2肖昌吉,周忠丽,邓文红.分布式防火墙原理及其技术研究[J].中国民航飞行学院学报,2005,16(2):27-30. 被引量:6
  • 3李秉键.浅谈分布式防火墙[J].网络安全技术与应用,2005(11):31-33. 被引量:7
  • 4[5]England P,Peinado M.Authenticated Operation of Open Computing Devices[C].Proc of 7th Australian Conf on Info Sec and Privacy,2002.
  • 5[7]Anderson R.Cryptography and Competition Policy:Issues with Trusted Computing[C].Proc of Workshop on Economics and Info Sec,2003.
  • 6[8]Bellare M,Canetti R,Krawczyk H.Message Authentication Using Hash Functions The HMAC Construction[J].Crypto Bytes,1996,2(1):30-40.
  • 7[9]Perrig A,Smith S,Song D,et al.SAM:A Flexible and Secure Auction Architecture Using Trusted Hardware[J].The Electronic Journal for E-commerce Tools and Applications,2002,1 (1):15-20.
  • 8[11]IEEE.IEEE Standard 802.11b 1999.LAN/MAN Specific Requirements Part 11:Wireless Medium Access Control (MAC) and Physical layer (PHY) Specifications:High Speed Physical Layer in the 5 GHz band[S/OL].(1999 -01 -05)[2007-07-05] http://www-networks.its.unimelb.edu.au/wireless/80211b-1999.pdf.
  • 9[12]IEEE.IEEE Standard 802.11i.Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.Amendment 6:Medium Access Control (MAC) Security Enhancements[S/OL].(2004-07-01)[2007-07 -05] http://research.ieeexplore.ieee.org/iel5/9214/29229/01318903.pdf.
  • 10[13]Chen J C,Jiang M C,Liu Y W.Wireless LAN security and IEEE 802.11i[J].IEEE Wireless Communications,2005,12(2):27-36.

共引文献12

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部