期刊文献+

数据信息安全的移动信息化平台优化探究

Research on Optimization of Mobile Information Platform for Data Information Security
下载PDF
导出
摘要 目前移动信息化平台飞速发展,随即存在的重点问题就是信息缺少安全性,信息外泄不断出现,因此对移动信息化平台进行优化分析非常必要。数据信息安全保密技术是信息化时代不断发展的前提,更是让企业生存发展的根本。伴随时代发展以及计算机技术进步,保护的目标、对策以及方式具有相应的转变,保密难度在持续提升。本文将针对数据信息安全的移动信息计划平台优化展开探究。 At present,the mobile information platform is developing rapidly,and the key problem that exists immediately is the lack of information security and the occurrence of information leakage.Therefore,it is very necessary to optimize and analyze the mobile information platform.Data and information security and confi-dentiality technology is the prerequisite for the continuous development of the information age,and it is the foundation for the survival and development of enterprises.With the development of the times and advances in computer technology,the objectives,countermeasures,and methods of protection have changed accordingly,and the difficulty of confidentiality continues to increase.This article will explore the optimization of mobile information planning platform for data information security.
作者 刘官永 LIU Guan-yong(AVIC Guizhou Aircraft Co.,Ltd.,Guizhou Anshun 561008,China)
出处 《新一代信息技术》 2021年第20期44-47,共4页 New Generation of Information Technology
关键词 数据信息安全 移动信息化 平台优化 探究 data information security mobile informatization platform optimization exploration
  • 相关文献

参考文献8

二级参考文献65

  • 1王浩亮.网上数字签名系统[J].电脑编程技巧与维护,2007(1):81-83. 被引量:2
  • 2梁丽瑾,续慧泓.基于并行审计技术的内部审计应用研究[J].审计研究,2007(2):36-38. 被引量:11
  • 3SEKAR V, EGI N, RATNASAMY S, et al. Design and implementation of a consolidated middlebox architecture [ C ] //Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation. Califor- nia: [ s. n. ] , 2012.
  • 4SERRAO G J. Network access control (NAC) : an open source analysis of architectures and requirements [ C ]// Proceedings of the 44th Annual 2010 IEEE International Carnahan Conference on Security Technology. San Jose: IEEE, 2010:94 - 102.
  • 5SATHYA G, VASANTHRAJ K. Network activity classi- fication schema in IDS and log audit for cloud computing [ C ]//Proceedings of 2013 International Conference on Information Communication and Embedded Systems. Chennai : IEEE Computer Society, 2013 : 502 - 506.
  • 6SHVACHKO K, KUANG H, RADIA S, et al. The Ha-doop distributed file system [ C ]//Proceedings of 2010 IEEE the 26th Symposium on Mass Storage Systems and Technologies. Lake Tahoe: IEEE Computer Society, 2010, doi : 10. 1109/MSST. 2010. 5496972.
  • 7SASAKI T, HATANO Y, SONODA K, et al. Load dis- tribution of an openflow controller ibr role-based network access control [ C ]//Proceedings of the 15 th Asia-Paci- fic Network Operations and Management Symposium: "Integrated Management of Network Virtualization". Hi- roshima, Japan: IEEE Computer Society, 2013, Article number : 6665289.
  • 8KINOSHITA S, WATANABE T, YAMATO J, et al. Implementation and evaluation of an OpenElow-based access control system for wireless LAN roaming [ C ]// Proceedings of the 36th Annual IEEE International Com- puter Software and Applications Conterenee Workshops. lzmir : IEEE Computer Society, 2012 : 82 - 87.
  • 9MATIAS J, GARAY J, MENDIOLA A, et al. FlowN- AC : flow-based network access control [ C ] // Procee- dings of the 3rd European Workshop on Software-De- fined Networks. Budapest: IEEE, 2014:79-84.
  • 10SODERSTROM O, MORADIAN E. Secure audit log management [ C ] // Proceedings of the 17th International Conference in Knowledge Based and Intelligent Intbrma- tion and Engineering Systems. Sweden:[ s. n. ] , 2013: 1249 - 1258.

共引文献109

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部