The digital content industry is becoming a new impetus for the development of the information industry as the infrastructure construction,including the optical fiber backbone transmission network and the wireless mobi...The digital content industry is becoming a new impetus for the development of the information industry as the infrastructure construction,including the optical fiber backbone transmission network and the wireless mobile access network,are being completed.Industrial analysis and technical research of the digital content become more and more important in this situation.Digital content security technology is one of the three supporting technologies in the digital content industry.The key points to guarantee digital content security include the solutions for the following problems:sale of pirated digital content,damage and pollution of illegal and harmful content to the social environment,and the means for consumers’ security and reasonable payment.These issues involve a lot of challenging scientific and technical problems such as highly efficient multimedia encryption and hiding algorithms,multimedia content recognition and filtering algorithms on network,and heterogeneous network oriented micropayment protocols.展开更多
Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks i...Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical.展开更多
The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication an...The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication and the access control modules are designed according to those analyses. Finally, the unified identity authentication and the access control on the business level are implemented separately. In the unified identity authentication module, based on an improved Kerberos-based authentication approach, a new control transfer method is proposed to solve the sharing problem of tickets among different servers of different departments. In the access control module, the functions of access controls are divided into different granularities to make the access control management more flexible. Moreover, the access control module has significant reference value for user management in similar systems.展开更多
With the flooding of pornographic information on the Internet, how to keep people away from that offensive information is becoming one of the most important research areas in network information security. Some applica...With the flooding of pornographic information on the Internet, how to keep people away from that offensive information is becoming one of the most important research areas in network information security. Some applications which can block or filter such information are used. Approaches in those systems can be roughly classified into two kinds: metadata based and content based. With the development of distributed technologies, content based filtering technologies will play a more and more important role in filtering systems. Keyword matching is a content based method used widely in harmful text filtering. Experiments to evaluate the recall and precision of the method showed that the precision of the method is not satisfactory, though the recall of the method is rather high. According to the results, a new pornographic text filtering model based on reconfirming is put forward. Experiments showed that the model is practical, has less loss of recall than the single keyword matching method, and has higher precision.展开更多
Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a l...Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a legally important collection of health data and documents. Recording facts and storing legally important documents are therefore the tasks of the operator. Using the prescriptive method we will determine which laws are governing the management of medical records, their safety and accessibility. Based on the descriptive method, we will describe the process of handling health records by the provider of health treatment, focusing on exposed regulatory gaps in the area of the protection of the rights of an individual. Through the analysis of the laws governing the management of health records, even after death and operator terminating the service, we will carry out inductive reasoning and provide conclusions regarding the attitude towards health records. Considering different results we can conclude that health information, especially documents relevant to the protection of individual’s rights, is not transparent. Above all, the documents in the collection are not recorded properly, thus allowing for their removal. Even the transfer of health records by the provider of health treatment is not defined, which could result in the disposal of the entire health documentation.展开更多
基金This work was funded by the National Natural Science Foundation of China under Grant 60675001.
文摘The digital content industry is becoming a new impetus for the development of the information industry as the infrastructure construction,including the optical fiber backbone transmission network and the wireless mobile access network,are being completed.Industrial analysis and technical research of the digital content become more and more important in this situation.Digital content security technology is one of the three supporting technologies in the digital content industry.The key points to guarantee digital content security include the solutions for the following problems:sale of pirated digital content,damage and pollution of illegal and harmful content to the social environment,and the means for consumers’ security and reasonable payment.These issues involve a lot of challenging scientific and technical problems such as highly efficient multimedia encryption and hiding algorithms,multimedia content recognition and filtering algorithms on network,and heterogeneous network oriented micropayment protocols.
基金supported by National Key Basic Research Program of China (No.2014CB340600)partially supported by National Natural Science Foundation of China (Grant Nos.61332019,61672531)partially supported by National Social Science Foundation of China (Grant No.14GJ003-152)
文摘Information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks involved are emotion sentence identification and classification,emotion tendency classification,and emotion expression extraction. Combining with the latent Dirichlet allocation(LDA) model,a Gibbs sampling implementation for inference of our algorithm is presented,and can be used to categorize emotion tendency automatically with the computer. In accordance with the lower ratio of recall for emotion expression extraction in Weibo,use dependency parsing,divided into two categories with subject and object,summarized six kinds of dependency models from evaluating objects and emotion words,and proposed that a merge algorithm for evaluating objects can be accurately evaluated by participating in a public bakeoff and in the shared tasks among the best methods in the sub-task of emotion expression extraction,indicating the value of our method as not only innovative but practical.
基金supported by Department of Science & Technology of Guangdong Province (No.2006A15006003)National High Technology Research and Development Program of China (863 Program)(No.2006AA04A120)
文摘The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication and the access control modules are designed according to those analyses. Finally, the unified identity authentication and the access control on the business level are implemented separately. In the unified identity authentication module, based on an improved Kerberos-based authentication approach, a new control transfer method is proposed to solve the sharing problem of tickets among different servers of different departments. In the access control module, the functions of access controls are divided into different granularities to make the access control management more flexible. Moreover, the access control module has significant reference value for user management in similar systems.
文摘With the flooding of pornographic information on the Internet, how to keep people away from that offensive information is becoming one of the most important research areas in network information security. Some applications which can block or filter such information are used. Approaches in those systems can be roughly classified into two kinds: metadata based and content based. With the development of distributed technologies, content based filtering technologies will play a more and more important role in filtering systems. Keyword matching is a content based method used widely in harmful text filtering. Experiments to evaluate the recall and precision of the method showed that the precision of the method is not satisfactory, though the recall of the method is rather high. According to the results, a new pornographic text filtering model based on reconfirming is put forward. Experiments showed that the model is practical, has less loss of recall than the single keyword matching method, and has higher precision.
文摘Health records have played an increasingly important role throughout history as an important legal document for the exercise of individuals’ rights. However, domestic legislation fails to define health records as a legally important collection of health data and documents. Recording facts and storing legally important documents are therefore the tasks of the operator. Using the prescriptive method we will determine which laws are governing the management of medical records, their safety and accessibility. Based on the descriptive method, we will describe the process of handling health records by the provider of health treatment, focusing on exposed regulatory gaps in the area of the protection of the rights of an individual. Through the analysis of the laws governing the management of health records, even after death and operator terminating the service, we will carry out inductive reasoning and provide conclusions regarding the attitude towards health records. Considering different results we can conclude that health information, especially documents relevant to the protection of individual’s rights, is not transparent. Above all, the documents in the collection are not recorded properly, thus allowing for their removal. Even the transfer of health records by the provider of health treatment is not defined, which could result in the disposal of the entire health documentation.