Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm...Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.展开更多
Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalizati...Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis.展开更多
Strengthening the security protection of overseas Chinese is an important means for China to safeguard its overseas interests.The Middle East is in turmoil with frequent security incidents involving Chinese nationals ...Strengthening the security protection of overseas Chinese is an important means for China to safeguard its overseas interests.The Middle East is in turmoil with frequent security incidents involving Chinese nationals and their assets.Ensuring the safety of Chinese natioanls is an important part of promoting the sound development of China and the Middle East relations.Drawing on the questionnaire survey,this paper examines the security threats and risks faced by Chinese nationals in some Middle Eastern states,and seeks to explore how China might enhance its security protection capability accordingly for Chinese nationals in the Middle East.It shows that the Chinese government has taken a series of measures to safeguard the legitimate rights and interests of Chinese nationals,by strengthening the top-level design and mechanism coordination,improving the consular protection system and overseas evacuation capabilities,and participating in security governance and non-traditional security cooperation in the Middle East.展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is neces- sar...With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is neces- sary to cultivate within it good group cohesion and vitality. Using empirical and experimental research methods, this study explores the ef- fect of users' trust in the VC Platform (VCP) on group cohesion and vitality and how brand and perceived privacy security can affect us- ers' trust in the VC. The research results indi- cate that the brand of the VCP can directly af- fect users' trust in the VC, and can also influe- nce it indirectly through users' perceived pri- vacy protection and perceived security protec- tion. Further, this study also confu'ms that the performance of the VC (group cohesion and vitality) is significantly affected by users' trust in the VC. The results of this study can provide theoretical guidance for internet companies to maintain and enhance the value of VCs.展开更多
Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the desi...Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of prototype system based on NASI.展开更多
Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the impl...Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.展开更多
博物馆安全是博物馆工作的重中之重,博物馆的安全为保障博物馆正常运转发挥重要作用。自2019年新冠肺炎疫情暴发以来,博物馆面临的安全形势十分严峻,主要表现为应急措施匮乏、灾害防范不到位以及管理体制不完善等问题。这给全球博物馆...博物馆安全是博物馆工作的重中之重,博物馆的安全为保障博物馆正常运转发挥重要作用。自2019年新冠肺炎疫情暴发以来,博物馆面临的安全形势十分严峻,主要表现为应急措施匮乏、灾害防范不到位以及管理体制不完善等问题。这给全球博物馆的发展带来了新的安全挑战,为博物馆安全提出了更高的要求,如何预防与应对博物馆突发事件成为博物馆安全的重要任务。该文选取了一篇国际博物馆协会官方发布的国际通用手册Guidelines for Disaster Preparedness in Museums为研究对象,从词汇、句法及篇章三个方面分析博物馆手册类文本的特点,归纳三种翻译策略,以期促进我国博物馆健康发展,为博物馆手册文本的翻译研究贡献绵薄之力。展开更多
This paper examines the current status of water resource management and conservation in China,along with strategies to address the water resource crisis.Given the current situation,the paper highlights issues such as ...This paper examines the current status of water resource management and conservation in China,along with strategies to address the water resource crisis.Given the current situation,the paper highlights issues such as incomplete legal mechanisms,limited environmental awareness among enterprises,and insufficient government investment.To ad-dress these challenges,the paper proposes a series of strategies,including improving the ecological environment,enhanc-ing production techniques,strengthening management systems,rationalizing water resource allocation,and implementing water-saving measures in both industrial and agricultural production.These strategies serve to achieve sustainable water resource management,reduce water pollution,and effectively tackle the pressing water resource issues faced in China currently.展开更多
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s...Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability.展开更多
In response to the frequent safety accidents of industrial robots, this paper designs and implements a safety detection system for robot control. It can perform real-time security detection of robot operations on indu...In response to the frequent safety accidents of industrial robots, this paper designs and implements a safety detection system for robot control. It can perform real-time security detection of robot operations on industrial production lines to improve the security and reliability of robot control systems. This paper designs and implements a robot control system based Snort-BASE for real-time online detection of DoS attacks. The system uses a six-degree-of-freedom robotic arm as an example, uses Snort to record the network communication data of the robot arm control system in real time, and filters the network traffic through self-defined rules, and then uses the BASE analysis platform to achieve security analysis of the network traffic. The solution verifies the effectiveness of online real-time detection of attacks and visualisation of attack records by designing simulated robotic arm and real robotic arm attack experiments respectively, thus achieving the security of network communication of the robot remote control system.展开更多
As the 5G communication networks are being widely deployed worldwide,both industry and academia have started to move beyond 5G and explore 6G communications.It is generally believed that 6G will be established on ubiq...As the 5G communication networks are being widely deployed worldwide,both industry and academia have started to move beyond 5G and explore 6G communications.It is generally believed that 6G will be established on ubiquitous Artificial Intelligence(AI)to achieve data-driven Machine Learning(ML)solutions in heterogeneous and massive-scale networks.However,traditional ML techniques require centralized data collection and processing by a central server,which is becoming a bottleneck of large-scale implementation in daily life due to significantly increasing privacy concerns.Federated learning,as an emerging distributed AI approach with privacy preservation nature,is particularly attractive for various wireless applications,especially being treated as one of the vital solutions to achieve ubiquitous AI in 6G.In this article,we first introduce the integration of 6G and federated learning and provide potential federated learning applications for 6G.We then describe key technical challenges,the corresponding federated learning methods,and open problems for future research on federated learning in the context of 6G communications.展开更多
This paper studies the secure motion control problem for micro-spacecraft systems.A novel semi-homomorphic encrypted control framework,consisting of a logarithmic quantizer,two uniform quantizers,and an encrypted cont...This paper studies the secure motion control problem for micro-spacecraft systems.A novel semi-homomorphic encrypted control framework,consisting of a logarithmic quantizer,two uniform quantizers,and an encrypted control law based on the Paillier cryptosystem is developed.More specifically,a logarithmic quantizer is adopted as a digitizer to convert the continuous relative motion information to digital signals.Two uniform quantizers with different quantization sensitivities are designed to encode the control gain matrix and digitized motion information to integer values.Then,we develop an encrypted state-feedback control law based on the Paillier cryptosystem,which allows the controller to compute the control input using only encrypted data.Using the Lyapunov stability theory and the homomorphic property of the Paillier cryptosystem,we prove that all signals in the closed-loop system are uniformly ultimately bounded.Different from the traditional motion control laws of spacecraft,the proposed encrypted control framework ensures the security of the exchanged data over the communication network of the spacecraft,even when communication channels are eavesdropped by malicious adversaries.Finally,we verify the effectiveness of the proposed encrypted control framework using numerical simulations.展开更多
文摘Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.
文摘Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis.
基金funded by China National Social Science Foundation,Grant/Award Number:20&ZD206China Postdoctoral Science Foundation Funded Project,Grant/Award Number:2022M722621.
文摘Strengthening the security protection of overseas Chinese is an important means for China to safeguard its overseas interests.The Middle East is in turmoil with frequent security incidents involving Chinese nationals and their assets.Ensuring the safety of Chinese natioanls is an important part of promoting the sound development of China and the Middle East relations.Drawing on the questionnaire survey,this paper examines the security threats and risks faced by Chinese nationals in some Middle Eastern states,and seeks to explore how China might enhance its security protection capability accordingly for Chinese nationals in the Middle East.It shows that the Chinese government has taken a series of measures to safeguard the legitimate rights and interests of Chinese nationals,by strengthening the top-level design and mechanism coordination,improving the consular protection system and overseas evacuation capabilities,and participating in security governance and non-traditional security cooperation in the Middle East.
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
基金supported by the National Natural Science Foundation of China under Grants No.71201011,No.71301106,No.71103021the Ministry of Education in China under Grants No.13YJA630084,No.13YJC630034,No.20120005120001
文摘With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is neces- sary to cultivate within it good group cohesion and vitality. Using empirical and experimental research methods, this study explores the ef- fect of users' trust in the VC Platform (VCP) on group cohesion and vitality and how brand and perceived privacy security can affect us- ers' trust in the VC. The research results indi- cate that the brand of the VCP can directly af- fect users' trust in the VC, and can also influe- nce it indirectly through users' perceived pri- vacy protection and perceived security protec- tion. Further, this study also confu'ms that the performance of the VC (group cohesion and vitality) is significantly affected by users' trust in the VC. The results of this study can provide theoretical guidance for internet companies to maintain and enhance the value of VCs.
文摘Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of prototype system based on NASI.
文摘Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development.
文摘博物馆安全是博物馆工作的重中之重,博物馆的安全为保障博物馆正常运转发挥重要作用。自2019年新冠肺炎疫情暴发以来,博物馆面临的安全形势十分严峻,主要表现为应急措施匮乏、灾害防范不到位以及管理体制不完善等问题。这给全球博物馆的发展带来了新的安全挑战,为博物馆安全提出了更高的要求,如何预防与应对博物馆突发事件成为博物馆安全的重要任务。该文选取了一篇国际博物馆协会官方发布的国际通用手册Guidelines for Disaster Preparedness in Museums为研究对象,从词汇、句法及篇章三个方面分析博物馆手册类文本的特点,归纳三种翻译策略,以期促进我国博物馆健康发展,为博物馆手册文本的翻译研究贡献绵薄之力。
文摘This paper examines the current status of water resource management and conservation in China,along with strategies to address the water resource crisis.Given the current situation,the paper highlights issues such as incomplete legal mechanisms,limited environmental awareness among enterprises,and insufficient government investment.To ad-dress these challenges,the paper proposes a series of strategies,including improving the ecological environment,enhanc-ing production techniques,strengthening management systems,rationalizing water resource allocation,and implementing water-saving measures in both industrial and agricultural production.These strategies serve to achieve sustainable water resource management,reduce water pollution,and effectively tackle the pressing water resource issues faced in China currently.
文摘Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability.
文摘In response to the frequent safety accidents of industrial robots, this paper designs and implements a safety detection system for robot control. It can perform real-time security detection of robot operations on industrial production lines to improve the security and reliability of robot control systems. This paper designs and implements a robot control system based Snort-BASE for real-time online detection of DoS attacks. The system uses a six-degree-of-freedom robotic arm as an example, uses Snort to record the network communication data of the robot arm control system in real time, and filters the network traffic through self-defined rules, and then uses the BASE analysis platform to achieve security analysis of the network traffic. The solution verifies the effectiveness of online real-time detection of attacks and visualisation of attack records by designing simulated robotic arm and real robotic arm attack experiments respectively, thus achieving the security of network communication of the robot remote control system.
基金supported by the National Research Foundation(NRF),Singapore,under Singapore Energy Market Authority(EMA),Energy Resilience,NRF2017EWT-EP003-041,Singapore NRF2015NRF-ISF001-2277Singapore NRF National Satellite of Excellence,Design Science and Technology for Secure Critical Infrastructure NSoE DeST-SCI2019-0007+4 种基金A*STARNTU-SUTD Joint Research Grant on Artificial Intelligence for the Future of Manufacturing RGANS1906,Wallenberg AI,Autonomous Systems and Software Program and Nanyang Technological University(WASP/NTU)under grant M4082187(4080),and NTU-We Bank JRI(NWJ-2020-004)Alibaba Group through Alibaba Innovative Research(AIR)Program and Alibaba-NTU Singapore Joint Research Institute(JRI),NTU,SingaporeNational Key Research and Development Program of China under Grant 2018YFC0809803 and Grant 2019YFB2101901Young Innovation Talents Project in Higher Education of Guangdong Province,China under grant No.2018KQNCX333in part by the National Science Foundation of China under Grant 61702364。
文摘As the 5G communication networks are being widely deployed worldwide,both industry and academia have started to move beyond 5G and explore 6G communications.It is generally believed that 6G will be established on ubiquitous Artificial Intelligence(AI)to achieve data-driven Machine Learning(ML)solutions in heterogeneous and massive-scale networks.However,traditional ML techniques require centralized data collection and processing by a central server,which is becoming a bottleneck of large-scale implementation in daily life due to significantly increasing privacy concerns.Federated learning,as an emerging distributed AI approach with privacy preservation nature,is particularly attractive for various wireless applications,especially being treated as one of the vital solutions to achieve ubiquitous AI in 6G.In this article,we first introduce the integration of 6G and federated learning and provide potential federated learning applications for 6G.We then describe key technical challenges,the corresponding federated learning methods,and open problems for future research on federated learning in the context of 6G communications.
基金supported partly by the National Natural Science Foundation of China under Grants 62227812 and 61960206011partly by the Zhejiang Provincial Natural Science Foundation under Grant LD22E050004+1 种基金partly by the Research Grants Council of Hong Kong under Project CityU 21208921partly by the Chow Sang Sang Group Research Fund Sponsored by Chow Sang Sang Holdings International Ltd.
文摘This paper studies the secure motion control problem for micro-spacecraft systems.A novel semi-homomorphic encrypted control framework,consisting of a logarithmic quantizer,two uniform quantizers,and an encrypted control law based on the Paillier cryptosystem is developed.More specifically,a logarithmic quantizer is adopted as a digitizer to convert the continuous relative motion information to digital signals.Two uniform quantizers with different quantization sensitivities are designed to encode the control gain matrix and digitized motion information to integer values.Then,we develop an encrypted state-feedback control law based on the Paillier cryptosystem,which allows the controller to compute the control input using only encrypted data.Using the Lyapunov stability theory and the homomorphic property of the Paillier cryptosystem,we prove that all signals in the closed-loop system are uniformly ultimately bounded.Different from the traditional motion control laws of spacecraft,the proposed encrypted control framework ensures the security of the exchanged data over the communication network of the spacecraft,even when communication channels are eavesdropped by malicious adversaries.Finally,we verify the effectiveness of the proposed encrypted control framework using numerical simulations.