期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network
1
作者 徐光伟 史有群 +2 位作者 朱明 吴国文 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期50-52,共3页
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy a... Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated. 展开更多
关键词 Ad Hoc security auditing access control of devices sign of devices property of event.
下载PDF
A Cross Language Code Security Audit Framework Based on Normalized Representation
2
作者 Yong Chen Chao Xu +1 位作者 Jing Selena He Sheng Xiao 《Journal of Quantum Computing》 2022年第2期75-84,共10页
With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an impor... With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an important aspect of future audit that cannot be ignored.However,the existing code security audit ismainly based on source code,which is difficult to meet the audit needs of more and more programming languages and binary commercial software.Based on the idea of normalized transformation,this paper constructs a cross language code security audit framework(CLCSA).CLCSA first uses compile/decompile technology to convert different highlevel programming languages and binary codes into normalized representation,and then usesmachine learning technology to build a cross language code security audit model based on normalized representation to evaluate code security and find out possible code security vulnerabilities.Finally,for the discovered vulnerabilities,the heuristic search strategy will be used to find the best repair scheme from the existing normalized representation sample library for automatic repair,which can improve the effectiveness of code security audit.CLCSA realizes the normalized code security audit of different types and levels of code,which provides a strong support for improving the breadth and depth of code security audit. 展开更多
关键词 Code security audit NORMALIZATION cross language security vulnerabilities
下载PDF
Social Security audit integration path analysis
3
作者 Guo Yantong 《International English Education Research》 2015年第6期51-53,共3页
Nowadays, China has entered the aging countries sequence, reform and development of the social insurance system is facing more opportunities and challenges, which give the social insurance audit work of the new requir... Nowadays, China has entered the aging countries sequence, reform and development of the social insurance system is facing more opportunities and challenges, which give the social insurance audit work of the new requirements. In practice, the social insurance audit work has encountered new conflicts and problems. Due to the socio-economic composition, organizational forms, forms of employment, interest, distribution relations have had a dramatic and profound change, labor relations was diversified, contract, complex features, social insurance premium is difficult, concealed drain Daily contribution base, have occurred impersonator false and social insurance benefits behavior. Loss of the social insurance fund is now urgently containment dike, to further regulate the social insurance audit work has become an important issue in the New Social Insurance Development. Therefore, we must establish a sound social security audit system, and promote the integration of social security audits, and thus be able to maintain the smooth progress of China's social insurance work. 展开更多
关键词 Social security audit INTEGRATION path analysis
下载PDF
Design and Implementation of Security Solution for Computer Network
4
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 Network security FIREWALL Intrusion detection security audit
下载PDF
Institutional Root Cause of the Irregularity of Social Security Funds in China 被引量:2
5
作者 Bingwen Zheng 《China & World Economy》 SCIE 2007年第5期65-76,共12页
This paper analyzes institutional defects in the Chinese social security system, based on irregularities in social security funds revealed in the Audit Report by the China National Audit Offce. The author divides the ... This paper analyzes institutional defects in the Chinese social security system, based on irregularities in social security funds revealed in the Audit Report by the China National Audit Offce. The author divides the irregularities into five categories according to the nature of fimd use. The results show that the institutional root cause of the irregularities lies in the unreasonable design and operation of the social security system, which currently faces management and institutional risks, This paper argues that simple rhetoric about strengthening regulation and supervision cannot help to reduce illegal practices, or to realize risk control. The only solution is to reform the social security system. Specifically, the Chinese Government should regulate the administrative cost of the social security system, and the behavior of its agencies, through legislation, reform the investment regime to increase rate of return of pension assets, and adjust and reshape the existing social security system, so as to elevate its pooling level. 展开更多
关键词 audit findings on social security funds capital market corruption cases investment of social security funds social security system reform
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部