期刊文献+
共找到867篇文章
< 1 2 44 >
每页显示 20 50 100
基于Spring Security安全框架的联通资源管理系统安全分析
1
作者 董一璠 李宝林 何先波 《电子设计工程》 2013年第8期61-64,共4页
基于为联通资源管系统提供一个方便可靠的安全框架的目的,采用"面向切面编程"(AOP)的Spring Security安全框架,结合了Spring框架提供的"控制反转"技术,最终创建了一个功能强大、安全可靠的权限控制安全框架。
关键词 软件工程 J2EE sPRING security 过滤器 B s
下载PDF
U. S. -Iraq War and China's National Security 被引量:1
2
作者 Gu Dexin 《Contemporary International Relations》 2003年第6期18-24,共7页
Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the w... Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common. 展开更多
关键词 of on IT into Iraq War and China’s National security that HAVE been for
下载PDF
Security transmission and recognition of F-knowledge 被引量:7
3
作者 Zhang Ling Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期877-882,共6页
The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of mu... The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems. 展开更多
关键词 s-rough sets F-knowledge security of knowledge RsA algorithm recognition criterion application.
下载PDF
Ecological Security Assessment in County Area Based on P-S-R Model——A Case Study of Ningwu County,Shanxi Province 被引量:3
4
作者 Feng Xufang Liu Jingmei Zhao Lijuan 《Meteorological and Environmental Research》 CAS 2014年第8期13-15,19,共4页
To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and cons... To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and considerable human impacts. Taking Ningwu as the study area and using variation coefficient method to determine the weights of the indices, we built ecological security pattern based on Pressure-State-Response (P-S-R) Model of Organization for Economic Cooperation and Development. The ecological security status was evaluated by calculating eco-security index (ESI) with socio-economic statistical data of Ningwu during 2001 -2010. The results showed that the situation of eco-security had been improved from heavy alarm to relative safety during 2001 -2010. It reflected that the ecological economic system in Ningwu County tended to be relaxed constantly after experienced a sharp conflict between ecological environment and economic growth. The ecological safety awareness was growing, however, by force of the objective requirements of population growth and economic development, the situation of ecological security was still unstable. 展开更多
关键词 Ecological security P-s-R model Es/ Ningwu County China
下载PDF
Risk assessment of water security in Haihe River Basin during drought periods based on D-S evidence theory 被引量:6
5
作者 Qian-jin DONG Xia LIU 《Water Science and Engineering》 EI CAS CSCD 2014年第2期119-132,共14页
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d... The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies. 展开更多
关键词 risk assessment water security drought periods entropy D-s evidence theory "evidential reasoning algorithm Haihe River Basin
下载PDF
Security Research on Engineering Database System
6
作者 REN Jian-ping 1,2, SONG Han-tao 2, LIANG Yun-rong 2 (1. North China Institute of Technology, Taiyuan 030051, China 2. Beijing Institute of Technology, Beijing 100081, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期288-289,共2页
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma... Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments. 展开更多
关键词 engineering database management system (EDBMs) s ecurity agent security level
下载PDF
Tourism Destination Eco-Security and Its Dynamic Evaluation Method 被引量:1
7
作者 SU Qiaolan 《Journal of Landscape Research》 2013年第Z1期35-37,40,共4页
Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understand... Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed. 展开更多
关键词 TOURIsM DEsTINATION Eco-security P-s-R MODE DYNAMIC EVALUATION
下载PDF
China's Labor and Social Security Protection under the Globle Financial Crisis 被引量:1
8
作者 SHI MEIXIA Professor of School of Economics and Management of Beijing Jiaotong University 《The Journal of Human Rights》 2011年第1期14-16,共3页
Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalizati... Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis. 展开更多
关键词 security China’s Labor and social security Protection under the Globle Financial Crisis
下载PDF
Scientific and Technological Innovation Is an Important Approach to Ensuring China’s Oil Security
9
作者 Liu Qianru Wang Jianyong 《Petroleum Science》 SCIE CAS CSCD 2006年第4期74-77,共4页
With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resou... With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production, energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security. 展开更多
关键词 China's economy oil security scientific and technological innovation energy conservation energy intensity
下载PDF
Check Point新安全加速模块整合Security Core技术
10
《电信科学》 北大核心 2012年第6期124-124,共1页
全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技... 全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技术,帮助客户防火墙实现高达110Gbit/s的吞吐量和不到5μs的时延,从而实现业界性能最高的双架单元防火墙。 展开更多
关键词 security 互联网安全 CHECK Point 软件技术 模块 10GBIT/s 客户防火墙
下载PDF
Reflections on China's Neighboring Security Environment
11
作者 Dao Shulin 《Contemporary International Relations》 2002年第12期27-32,共6页
There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It ha... There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It has become the important factor that influences world future trend. In the meanwhile, changes in international situation also exerted increasing influence on China. Therefore it is of special significance to discuss and assess the international environment that China faces. 展开更多
关键词 security Reflections on China’s Neighboring security Environment
下载PDF
International Security & China's New Security Concept
12
《International Understanding》 2002年第1期4-6,共3页
关键词 security International security MORE China’s New security Concept
下载PDF
RECENT DEVELOPMENTS OF US ASIA-PACIFIC SECURITY STRATEGY AND CHINA'S COUNTERMEASURES
13
作者 ZHANG JINGQUAN 《Contemporary World》 2017年第2期14-17,共4页
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi... The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald 展开更多
关键词 Us in Is on WILL that RECENT DEVELOPMENTs OF Us AsIA-PACIFIC security sTRATEGY AND CHINA’s COUNTERMEAsUREs ROK of
下载PDF
China's Social Security (Ⅱ)
14
《China Today》 1997年第12期47-50,共4页
关键词 China’s social security In
下载PDF
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
15
作者 Abou_el_ela Abdou Hussein 《Journal of Information Security》 2020年第4期304-328,共25页
The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Compan... The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> during the previous two decades;the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty</span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems. 展开更多
关键词 Big Data Big Data V’s Characteristics security PRIVACY CHALLENGEs Technological solutions
下载PDF
Suggestions on China's Petroleum Security Strategy and Policies
16
《China Oil & Gas》 CAS 2001年第1期23-27,共5页
关键词 security suggestions on China’s Petroleum security strategy and Policies
下载PDF
CHINA'S POST-COLD WAR SECURITY STRATEGY
17
作者 Yan Xuetong Deputy Director,Center for China’s Foreign Policy Studies,China Institute of Contemporary International Relations 《Contemporary International Relations》 1995年第5期1-16,共16页
Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether ... Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year, 展开更多
关键词 CHINA’s POsT-COLD WAR security sTRATEGY
下载PDF
China's Military And Economic Security Under the Guidance of the New Security Concept
18
《International Understanding》 2002年第1期21-23,共3页
关键词 security China’s Military And Economic security Under the Guidance of the New security Concept
下载PDF
Expand International Understanding and Improve China's Environment for National Security
19
作者 Yang Yi Director of institute for Strategic Studies of National De fen se University 《International Understanding》 2003年第3期40-40,共1页
关键词 Expand International Understanding and Improve China’s Environment for National security for
下载PDF
Study and Application Techniques on Web System Security Based on B/S Mode
20
作者 Xinbo Qi Qingliang Li Xueguang Chen 《通讯和计算机(中英文版)》 2006年第5期82-85,102,共5页
关键词 网络安全 软件开发 WEB系统 B/s模式
下载PDF
上一页 1 2 44 下一页 到第
使用帮助 返回顶部