期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Application of Curriculum Ideological and Political Cases in the Teaching of Road Survey and Design
1
作者 Aijun Chen Bai Yang +1 位作者 Xianyuan Tang Junhua Chen 《Journal of Educational Theory and Management》 2022年第1期73-80,共8页
Ideological and political construction of curriculum is the key link to implement the fundamental task of moral education.Focusing on the training objectives of civil engineering professionals in the new era,combined ... Ideological and political construction of curriculum is the key link to implement the fundamental task of moral education.Focusing on the training objectives of civil engineering professionals in the new era,combined with the teaching concepts of moral education and student-centered education,the teaching objectives for the course of road survey and design have been re-set.The implementation plan of ideological and political education has been put into practice by involving excellent engineering cases,stories of outstanding figures in this field,traffic accidents,design concepts and technological innovation to explore the methods of integrating ideological and political cases into curriculum teaching for a continuous improvement of the promotion of curriculum ideological and political education to the teaching quality of professional courses. 展开更多
关键词 Road surveying and design Ideological and political education CASE Integration
下载PDF
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 被引量:1
2
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Muhammad Farhan Umar Mahmood 《Journal of Information Security》 2021年第3期189-211,共23页
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err... Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span> 展开更多
关键词 Business Logic design Flaws Components Integration Flaws E-Commerce system Assurance & Security Model Based design Business Logic Attacks Attack Pattern
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部