期刊文献+

面向央企数字档案共享的数据安全技术研究

Research on Data Security Technology for Central Enterprises Digital File Sharing
下载PDF
导出
摘要 随着数字化进程的加速,越来越多的央企开始探索数字档案共享的方式,以便更好地利用数据资源,提升决策效率。然而,数字档案共享也存在一系列的安全风险和隐私问题,这使得央企难以放心实施数字档案共享,因此,研究数字档案共享安全保护技术迫在眉睫。本文围绕央企数字档案共享安全问题,研究分析了数据共享中的典型数据保护技术和隐私保护技术,通过技术对比分析,结合央企内部数字档案共享和跨央企数字档案共享场景,提出了一种综合央企数字档案共享保护方案。通过分析表明,方案在央企数字档案共享应用中具有一定的可行性和有效性,满足央企数字档案共享安全需求,可以为央企数字档案共享服务安全建设提供一定启示。 With the acceleration of digitization,more and more enterprises are exploring digital file sharing to make better use of data resources and improve decision-making efficiency.However,digital file sharing also has a series of security risks and privacy issues,which make it difficult for enterprises to implement digital file sharing with confidence,so it is urgent to study digital file sharing security protection technologies.This paper focuses on enterprise digital file sharing security issues,researches and analyzes typical data protection technologies and privacy protection technologies in data sharing,and proposes a comprehensive enterprise digital file sharing protection scheme by combining intra-enterprise digital file sharing and cross-enterprise digital file sharing scenarios through technology comparison analysis.The analysis shows that the scheme is feasible and effective in enterprise digital file sharing applications,meets the security requirements of enterprise digital file sharing,and can provide some insight into the security construction of enterprise digital file sharing services.
作者 尹明 王燕 Yin Ming;Wang Yan(China Aerospace Science and Technology Corporation Information Center,Beijing,100048;China Aerospace Science and Technology Corporation,Beijing,100048)
出处 《工业信息安全》 2023年第4期85-92,共8页 Industry Information Security
关键词 中央企业 数字档案共享 数据安全 Central Enterprise Digital File Sharing Data Security
  • 相关文献

二级参考文献65

  • 1江必新.习近平法治思想的逻辑体系与理论特征[J].求索,2021(2):5-16. 被引量:23
  • 2吴光远,何丕廉,曹桂宏,聂颂.基于向量空间模型的词共现研究及其在文本分类中的应用[J].计算机应用,2003,23(z1):138-140. 被引量:23
  • 3李北伟,庄明浩.信息安全技术与产品发展趋势分析[J].情报科学,2007,25(4):618-623. 被引量:3
  • 4冯惠玲,钱毅.关于电子文件管理顶层设计的若干设想[J].中国档案,2007(4):7-9. 被引量:31
  • 5Rivest R,Adleman L,Dertouzos M.On data banks and privacy homomorphisms[M]Foundations of Secure Computation.New York:Academic Press,1978:169-180.
  • 6Cohen J,Fischer M.A robust and verifiable cryptographically secure election scheme (Extended Abstract)[C]//Proc of the 26th Annual Symp on Foundations of Computer Science (FOCS1985).Piscataway,NJ:IEEE,1985:372-382.
  • 7Damgard I,Jurik M.A generalization,a simplification and some applications of Pailliers probabilistic public-key system[G]//LNCS 1992:Proc of Public Key Cryptography (PKC 2001).Berlin:Springer,2001:119-136.
  • 8Paillier P.Public-key cryptosystems based on composite degree residuosity classes[G]//LNCS 1592:Proc of Eurocrypt 1999.Berlin:Springer,1999:223-238.
  • 9Melchor C,Gaborit P.A lattice-based computationally efficient private information retrieval protocol[EB/OL].2007[2012-12-09].http://eprint.iacr.org/2007/446.
  • 10Lipmaa H.An Oblivious transfer protocol with log-squared communication[G]//LNCS 3650:Proc of ISC 2005.Berlin:Springer,2005:314-328.

共引文献173

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部