期刊文献+

大数据时代高校学生档案信息安全管理 被引量:6

Information Security Management of College students’ Archives in big data era
下载PDF
导出
摘要 随着网络技术的发展,传统高校学生档案信息安全管理方法存在被攻击的风险。提出大数据时代高校学生档案信息安全管理方法。运用基于主机入侵检测系统和Web安全扫描工具进行风险识别,利用基于模糊理论的风险评估方法进行风险评估,实现了风险控制,实现对学生档案信息的安全管理。结果表明,大数据时代,高校学生档案信息安全管理方法与传统方法对比而言,其评估准确性均提高20%,表明该方法能有效保证信息安全。 with the development of network technology,the traditional management method of college student file information security has the risk of being attacked.This paper puts forward the security management method of college students'archives information in big data era.Risk identification is carried out by using host intrusion detection system and Web security scanning tool,and risk assessment method based on fuzzy theory is used to realize risk control and security management of student file information.The results show that the accuracy of identification and evaluation is improved by 20%compared with the traditional methods in the big data era,which indicates that this method can effectively guarantee the information security.
作者 孙永忠 Sun Yong Zhong
出处 《兰台世界》 2019年第6期34-36,共3页 Lantai World
关键词 无线传输网络 访问 安全性算法 信任值 wireless transmission network access security algorithm trust value
  • 相关文献

参考文献10

二级参考文献67

  • 1杜玉霞.美国信息素养教育与研究的启示[J].电化教育研究,2005,26(10):41-43. 被引量:44
  • 2安小米.中外科研档案管理的现状比较及借鉴[J].中国档案,2007(8):60-61. 被引量:20
  • 3甘阳,赵友良(整理),涂瑞珍(整理).通识教育:美国与中国[J].复旦教育论坛,2007,5(5):22-29. 被引量:65
  • 4[德].柯武刚,史曼飞著,韩朝华,译.制度经济学--社会秩序与公共政策[M].北京:商务印书馆,2000.
  • 5Manyika J,Chui M,Brown B,et al.Big data;the next frontier for innovation,competition,and productivity. . 2011
  • 6Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data [C]. IEEE Symposium on Security and Privacy, Berkeley, CA,2000 : 44 -55.
  • 7Zhang J F, Xing M S, Nigel L. Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query[J]. IEEE Transactions on Consumer E- lectronics ,2014,60( 1 ) : 164-172.
  • 8Boneh D, Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search [J]. Eurocrypt ,2004,49 ( 16 ) :506-522.
  • 9Goyal V, Sahai A, Pandey O, et al. Attribute-based encryption for fine-grained access control of encrypted data [C]. Proceedings of the 13th ACM Conference on Computer and Communications Secu- rity,New York,America,2006:89-98.
  • 10Chang Y D, Giovanni R, Naranker D. Shared and searchable en- crypted data for untrusted servers [J]. Computer Science and Net- working Security ,2011,19 ( 3 ) : 367-397.

共引文献109

同被引文献28

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部