期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities 被引量:1
1
作者 Man Liu Lei Yu 《Intelligent Information Management》 2022年第2期71-79,共9页
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm... Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities. 展开更多
关键词 Oracle Database security protection Database Backup Disaster Recovery Colleges and Universities
下载PDF
China's Labor and Social Security Protection under the Globle Financial Crisis 被引量:1
2
作者 SHI MEIXIA Professor of School of Economics and Management of Beijing Jiaotong University 《The Journal of Human Rights》 2011年第1期14-16,共3页
Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalizati... Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis. 展开更多
关键词 security China’s Labor and Social security protection under the Globle Financial Crisis
下载PDF
China’s Security Protection of Chinese Nationals in the Middle East
3
作者 Dandan Zhang 《Asian Journal of Middle Eastern and Islamic Studies》 2023年第1期66-82,共17页
Strengthening the security protection of overseas Chinese is an important means for China to safeguard its overseas interests.The Middle East is in turmoil with frequent security incidents involving Chinese nationals ... Strengthening the security protection of overseas Chinese is an important means for China to safeguard its overseas interests.The Middle East is in turmoil with frequent security incidents involving Chinese nationals and their assets.Ensuring the safety of Chinese natioanls is an important part of promoting the sound development of China and the Middle East relations.Drawing on the questionnaire survey,this paper examines the security threats and risks faced by Chinese nationals in some Middle Eastern states,and seeks to explore how China might enhance its security protection capability accordingly for Chinese nationals in the Middle East.It shows that the Chinese government has taken a series of measures to safeguard the legitimate rights and interests of Chinese nationals,by strengthening the top-level design and mechanism coordination,improving the consular protection system and overseas evacuation capabilities,and participating in security governance and non-traditional security cooperation in the Middle East. 展开更多
关键词 Overseas interests security threats security protection capability Chinese nationals
原文传递
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
4
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database security and protection System)
下载PDF
How to Make Virtual Community More Active and Cohesive:From Brand and Perceived Protection Perspectives
5
作者 万岩 林国源 范静 《China Communications》 SCIE CSCD 2013年第12期1-15,共15页
With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is neces- sar... With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is neces- sary to cultivate within it good group cohesion and vitality. Using empirical and experimental research methods, this study explores the ef- fect of users' trust in the VC Platform (VCP) on group cohesion and vitality and how brand and perceived privacy security can affect us- ers' trust in the VC. The research results indi- cate that the brand of the VCP can directly af- fect users' trust in the VC, and can also influe- nce it indirectly through users' perceived pri- vacy protection and perceived security protec- tion. Further, this study also confu'ms that the performance of the VC (group cohesion and vitality) is significantly affected by users' trust in the VC. The results of this study can provide theoretical guidance for internet companies to maintain and enhance the value of VCs. 展开更多
关键词 trust in the virtual community pla-tform group privacy concern perceived priv-acy protection perceived security protection group cohesion group vitality
下载PDF
Research on the Application Security Isolation Model
6
作者 Gong Lei Zhao Yong Liao Jianhua 《China Communications》 SCIE CSCD 2010年第6期153-156,共4页
Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the desi... Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of prototype system based on NASI. 展开更多
关键词 application isolation security model application security protection
下载PDF
Chinese Citizens' Right To Work and Social Security Effectively Protected——An interview with Zheng Silin, minister of labor and social security
7
作者 OUR STAFF REPORTERS 《The Journal of Human Rights》 2005年第1期2-7,共6页
Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the impl... Following is an interview by staff reporters of the Human Rights magazine with Zheng Silin, Chinese minister of labor and social security. The interview was meant in part to celebrate the tenth anniversary of the implementation of the Labor Law of the People's Republic of China that falls on January 1,2005. We are publishing this transcript with a view to providing our readers with information about how China has worked persistently to protect citizens' right to work and social security and the achievements it has made in this regard. We need to remind our readers of the fact that back in March 2004, the National People's Congress, China's highest legislature, approved a recommendation for revision of China's Constitution. In accordance with the recommendation, the Constitution had one more clause added: The state shall establish and improve a social security system commensurate to the level of the economic and social development. 展开更多
关键词 minister of labor and social security An interview with Zheng Silin Chinese Citizens Right To Work and Social security Effectively Protected security WORK
下载PDF
博物馆手册类文本汉译策略——以Guidelines for Disaster Preparedness in Museums为例
8
作者 石瑶 王秀峰 《海外英语》 2023年第5期39-41,共3页
博物馆安全是博物馆工作的重中之重,博物馆的安全为保障博物馆正常运转发挥重要作用。自2019年新冠肺炎疫情暴发以来,博物馆面临的安全形势十分严峻,主要表现为应急措施匮乏、灾害防范不到位以及管理体制不完善等问题。这给全球博物馆... 博物馆安全是博物馆工作的重中之重,博物馆的安全为保障博物馆正常运转发挥重要作用。自2019年新冠肺炎疫情暴发以来,博物馆面临的安全形势十分严峻,主要表现为应急措施匮乏、灾害防范不到位以及管理体制不完善等问题。这给全球博物馆的发展带来了新的安全挑战,为博物馆安全提出了更高的要求,如何预防与应对博物馆突发事件成为博物馆安全的重要任务。该文选取了一篇国际博物馆协会官方发布的国际通用手册Guidelines for Disaster Preparedness in Museums为研究对象,从词汇、句法及篇章三个方面分析博物馆手册类文本的特点,归纳三种翻译策略,以期促进我国博物馆健康发展,为博物馆手册文本的翻译研究贡献绵薄之力。 展开更多
关键词 手册翻译 英译汉 国际博物馆协会 Guidelines for Disaster Preparedness in Museums Museum security and protection
下载PDF
Analysis of the Status and Rational Allocation of Water Resources in China in View of the New Era
9
作者 Yizhe Li 《Journal of World Architecture》 2023年第6期89-94,共6页
This paper examines the current status of water resource management and conservation in China,along with strategies to address the water resource crisis.Given the current situation,the paper highlights issues such as ... This paper examines the current status of water resource management and conservation in China,along with strategies to address the water resource crisis.Given the current situation,the paper highlights issues such as incomplete legal mechanisms,limited environmental awareness among enterprises,and insufficient government investment.To ad-dress these challenges,the paper proposes a series of strategies,including improving the ecological environment,enhanc-ing production techniques,strengthening management systems,rationalizing water resource allocation,and implementing water-saving measures in both industrial and agricultural production.These strategies serve to achieve sustainable water resource management,reduce water pollution,and effectively tackle the pressing water resource issues faced in China currently. 展开更多
关键词 Water resources Ecological environment Water security protection and utilization
下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
10
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 Communication Protocol Hybrid Encryption security protection
下载PDF
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
11
作者 Nana Li Yong Wang +2 位作者 Pengfei Shen Shuangfei Li Lin Zhou 《Journal of Computer and Communications》 2022年第4期1-13,共13页
In response to the frequent safety accidents of industrial robots, this paper designs and implements a safety detection system for robot control. It can perform real-time security detection of robot operations on indu... In response to the frequent safety accidents of industrial robots, this paper designs and implements a safety detection system for robot control. It can perform real-time security detection of robot operations on industrial production lines to improve the security and reliability of robot control systems. This paper designs and implements a robot control system based Snort-BASE for real-time online detection of DoS attacks. The system uses a six-degree-of-freedom robotic arm as an example, uses Snort to record the network communication data of the robot arm control system in real time, and filters the network traffic through self-defined rules, and then uses the BASE analysis platform to achieve security analysis of the network traffic. The solution verifies the effectiveness of online real-time detection of attacks and visualisation of attack records by designing simulated robotic arm and real robotic arm attack experiments respectively, thus achieving the security of network communication of the robot remote control system. 展开更多
关键词 Robotic Arms Remote Control Systems Cyber Attacks BASE SNORT security protection
下载PDF
Federated Learning for 6G Communications:Challenges,Methods,and Future Directions 被引量:26
12
作者 Yi Liu Xingliang Yuan +3 位作者 Zehui Xiong Jiawen Kang Xiaofei Wang Dusit Niyato 《China Communications》 SCIE CSCD 2020年第9期105-118,共14页
As the 5G communication networks are being widely deployed worldwide,both industry and academia have started to move beyond 5G and explore 6G communications.It is generally believed that 6G will be established on ubiq... As the 5G communication networks are being widely deployed worldwide,both industry and academia have started to move beyond 5G and explore 6G communications.It is generally believed that 6G will be established on ubiquitous Artificial Intelligence(AI)to achieve data-driven Machine Learning(ML)solutions in heterogeneous and massive-scale networks.However,traditional ML techniques require centralized data collection and processing by a central server,which is becoming a bottleneck of large-scale implementation in daily life due to significantly increasing privacy concerns.Federated learning,as an emerging distributed AI approach with privacy preservation nature,is particularly attractive for various wireless applications,especially being treated as one of the vital solutions to achieve ubiquitous AI in 6G.In this article,we first introduce the integration of 6G and federated learning and provide potential federated learning applications for 6G.We then describe key technical challenges,the corresponding federated learning methods,and open problems for future research on federated learning in the context of 6G communications. 展开更多
关键词 6G communication federated learning security and privacy protection
下载PDF
Secure motion control of micro-spacecraft using semi-homomorphic encryption 被引量:1
13
作者 Yongxia Shi Ehsan Nekouei Qinglei Hu 《Security and Safety》 2023年第4期34-48,共15页
This paper studies the secure motion control problem for micro-spacecraft systems.A novel semi-homomorphic encrypted control framework,consisting of a logarithmic quantizer,two uniform quantizers,and an encrypted cont... This paper studies the secure motion control problem for micro-spacecraft systems.A novel semi-homomorphic encrypted control framework,consisting of a logarithmic quantizer,two uniform quantizers,and an encrypted control law based on the Paillier cryptosystem is developed.More specifically,a logarithmic quantizer is adopted as a digitizer to convert the continuous relative motion information to digital signals.Two uniform quantizers with different quantization sensitivities are designed to encode the control gain matrix and digitized motion information to integer values.Then,we develop an encrypted state-feedback control law based on the Paillier cryptosystem,which allows the controller to compute the control input using only encrypted data.Using the Lyapunov stability theory and the homomorphic property of the Paillier cryptosystem,we prove that all signals in the closed-loop system are uniformly ultimately bounded.Different from the traditional motion control laws of spacecraft,the proposed encrypted control framework ensures the security of the exchanged data over the communication network of the spacecraft,even when communication channels are eavesdropped by malicious adversaries.Finally,we verify the effectiveness of the proposed encrypted control framework using numerical simulations. 展开更多
关键词 Spacecraft relative motion security protection encrypted control homomorphic encryption QUANTIZATION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部