期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Status and prospect of security management of marine data storage
1
作者 WU Yongfang CAI Renhan +2 位作者 ZHANG Xueling SI Jia WANG Xiaorui 《Marine Science Bulletin》 2024年第1期57-66,共10页
China's marine data includes marine hydrology,marine meteorology,marine biology,marine chemistry,marine substrate,marine geophysical,seabed topography and other categories of data,the total amount of data reaches ... China's marine data includes marine hydrology,marine meteorology,marine biology,marine chemistry,marine substrate,marine geophysical,seabed topography and other categories of data,the total amount of data reaches the magnitude of PB,and the amount of data is still increasing.The safe management of these marine data storage is the basis of building a Smart Ocean.This paper discusses the current situation of security management of marine data storage in China,analyzes the problems of security management in domestic marine data storage,and puts forward suggestions. 展开更多
关键词 intelligent ocean DATA STORAGE security management
下载PDF
Proof of Activity Protocol for IoMT Data Security
2
作者 R.Rajadevi K.Venkatachalam +2 位作者 Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期339-350,共12页
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical appearance.With the use of sensors,IoMT applications are used in healthcare management.In such applications,one of the most important factors is data security,given that its transmission over the network may cause obtrusion.For data security in IoMT systems,blockchain is used due to its numerous blocks for secure data storage.In this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system.The main aim is to enhance the data security over the networks.The PoA protocol enhances high security of data from the literature review.By replacing the malicious node from the block,the PoA can provide high security for medical data in the blockchain.Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems. 展开更多
关键词 Blockchain IoMT malicious code detection security secure data management framework data management POA
下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
3
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
下载PDF
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach 被引量:2
4
作者 Joseph E. Mbowe Simon S. Msanjila +1 位作者 George S. Oreku Khamisi Kalegele 《Journal of Software Engineering and Applications》 2016年第12期601-623,共23页
The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define ... The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes. 展开更多
关键词 security Threats Analytic Threat Visualization security Management Automated security Policies
下载PDF
Application of the PKPM-BIM construction management platform in project security management 被引量:1
5
作者 Liu Chen Wang Jing 《Computer Aided Drafting,Design and Manufacturing》 2017年第1期58-62,共5页
This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contr... This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction. 展开更多
关键词 PKPM-BIM construction management platform security management BIM technology CONSTRUCTION CONTRACTOR
下载PDF
Technical Analysis of Security Management in Terms of Crowd Energy and Smart Living
6
作者 MD Shahrukh Adnan Khan Muhammad Ahad Rahman Miah +4 位作者 Shaikh Rashedur Rahman Mirza Mursalin Iqbal Aseef Iqbal Aravind CV Chua Kein Huat 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第4期367-378,共12页
In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept an... In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept and next generation smart living. Various case examples have been studied and a brief summary has been provided.Furthermore, a statistical analysis has been provided in terms of security management in smart living where it is found that young technocrats give the highest importance to security management in smart living. Last but not the least, current limitation, constraints, and future scope of security implementation have been discussed in terms of crowd energy clustered with next generation smart living. 展开更多
关键词 Crowd energy security management smart living statistical analysis
下载PDF
Information Security Service Support-Helping End-Users Cope with Security
7
作者 Rahul Rastogi Rossouw yon Solms 《Computer Technology and Application》 2011年第2期137-147,共11页
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor... Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service. 展开更多
关键词 Information security management information security service management (ISSM) service management informationsecurity service support (ISSS) service encounter.
下载PDF
The Role of Information Security Development (ISD) in Effective Information Security Management (ISM) Implementation in the Banks: A Nigerian Case
8
作者 Dorcas Adebola Babatunde Mohamad Hisyam Selamat Ramat Titilayo Salman 《Journal of Modern Accounting and Auditing》 2014年第5期614-619,共6页
This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, inform... This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in effective information security management (ISM) implementation in the banks (a Nigerian case). This paper explores the existing literature and a proposed framework that consists of ISD such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in ISM implementation. ISD factors are found to be statistically significant, because it motivates an organization to implement effective ISM in the banks. Hence, it could be said that the role of ISD practices in an effective implementation of ISM among banks in Nigeria will be of great value. 展开更多
关键词 information security management (ISM) information security plans perceived quality training programs organizational culture Nigeria
下载PDF
Research on Heterogeneous Network Security Devices
9
作者 Yishui Lin Tingting Yu 《International Journal of Technology Management》 2013年第3期23-27,共5页
With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to de... With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices. 展开更多
关键词 heterogeneous networks security management security equipment
下载PDF
Security,Controllability,Manageability and Survivability in Trustworthy Network
10
作者 Wang Sheng, Yu Hongfang, Xu Du (School of Communication and Information Engineering ,University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China) 《ZTE Communications》 2008年第1期33-38,共6页
The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming m... The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming more and more obvious. Although the Internet community came up with a consensus that the future network should be trustworthy, the concept of 'trustworthy networks' and the ways leading us to a trustworthy network are not yet clear. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy network. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed. The network trustworthiness could and should be eventually achieved. 展开更多
关键词 security Controllability Manageability and Survivability in Trustworthy Network NET
下载PDF
Research on the sustainable development of social security fund
11
作者 WANG Lina 《International English Education Research》 2017年第6期54-56,共3页
At present, the social security fund has a serious problem in all aspects. This paper introduces the social security fund related background, elaborated the social security fund and social security fund related to sus... At present, the social security fund has a serious problem in all aspects. This paper introduces the social security fund related background, elaborated the social security fund and social security fund related to sustainable development concept and its significance: analyzes the current situation of the social security fund and the problems that can realize sustainable development, the key lies in the internal operation mechanism of social security funds, especially the social security fund raising mechanism capacity and investment capacity, ability to pay and supervision ability; finally puts forward some countermeasures for promoting the sustainable development of the social security fund, the balance of the social security fund is the social security system of sustainable development conditions. 展开更多
关键词 social security fund social security fund management sustainable development
下载PDF
New capacity steadily commissioned, security management highly strengthened
12
《Electricity》 1998年第3期5-5,共1页
关键词 New capacity steadily commissioned security management highly strengthened
下载PDF
On an Interactive Network Security Measure
13
作者 罗惠琼 王佳昊 赵强 《Journal of Electronic Science and Technology of China》 2004年第1期35-37,共3页
An interactive network security measure and a description of its function as well as its principle are presented. Based on the existing security loopholes and bugs in operating systems, this measure focuses on the res... An interactive network security measure and a description of its function as well as its principle are presented. Based on the existing security loopholes and bugs in operating systems, this measure focuses on the restrictive condition of security and the establishment of configuration files. Under the control and administration of the secure management of configuration files, each system module brings much flexibility, adaptability and high-level security. The security detecting and managing software used in UNIX based on this measure has obtained good results, achieving the goal of automatically detecting and handling inner and outer system-violation and system abuse. 展开更多
关键词 network security UNIX security management configuration files
下载PDF
Information Security Management Measures for College Archives Under the Network Environment
14
作者 Litao Cui 《Journal of Electronic Research and Application》 2022年第6期15-19,共5页
The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelera... The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelerated.Network technology is developing rapidly in our country,and the number of network users has increased significantly.The use of network technology in university archives management can improve the management efficiency and quality of archives,but the safety factor has dropped significantly.For example,the archival system may face many problems such as virus infection,system paralysis,or cyberattacks,which affects the security of the university archives.Therefore,this paper presents an analysis of these problems in detail,and proposes corresponding solutions,so as to optimize and improve the information security management of college archives. 展开更多
关键词 Network environment University archives Information security management
下载PDF
Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network
15
作者 Lei Feng Bo Wang +2 位作者 Fuqi Ma Hengrui Ma Mohamed AMohamed 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1487-1501,共15页
As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk dete... As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately.Therefore,more reliable and accurate security control methods are urgently needed.In order to improve the accuracy and reliability of the operation risk management and control method,this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network.To provide early warning and control of targeted risks,first,the video stream is framed adaptively according to the pixel changes in the video stream.Then,the optimized MobileNet is used to extract the feature map of the video stream,which contains both time-series and static spatial scene information.The feature maps are combined and non-linearly mapped to realize the identification of dynamic operating scenes.Finally,training samples and test samples are produced by using the whole process image of a power company in Xinjiang as a case study,and the proposed algorithm is compared with the unimproved MobileNet.The experimental results demonstrated that the method proposed in this paper can accurately identify the type and start and end time of each operation link in the whole process of electric power operation,and has good real-time performance.The average accuracy of the algorithm can reach 87.8%,and the frame rate is 61 frames/s,which is of great significance for improving the reliability and accuracy of security control methods. 展开更多
关键词 security risk management key links identifications electric power operation spatiotemporal mixing convolution neural network MobileNet network
下载PDF
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
16
作者 Antonio SANTOS-OLMO Luis Enrique SÁNCHEZ +4 位作者 David G.ROSADO Manuel A.SERRANO Carlos BLANCO Haralambos MOURATIDIS Eduardo FERNÁNDEZ-MEDINA 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第3期199-216,共18页
The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets.The availability of these systems is now vital for the protection and ev... The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets.The availability of these systems is now vital for the protection and evolution of companies.However,several factors have led to an increasing need for more accurate risk analysis approaches.These are:the speed at which technologies evolve,their global impact and the growing requirement for companies to collaborate.Risk analysis processes must consequently adapt to these new circumstances and new technological paradigms.The objective of this paper is,therefore,to present the results of an exhaustive analysis of the techniques and methods offered by the scientific community with the aim of identifying their main weaknesses and providing a new risk assessment and management process.This analysis was carried out using the systematic review protocol and found that these proposals do not fully meet these new needs.The paper also presents a summary of MARISMA,the risk analysis and management framework designed by our research group.The basis of our framework is the main existing risk standards and proposals,and it seeks to address the weaknesses found in these proposals.MARISMA is in a process of continuous improvement,as is being applied by customers in several European and American countries.It consists of a risk data management module,a methodology for its systematic application and a tool that automates the process. 展开更多
关键词 information security management security system security risk assessment and management
原文传递
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
17
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (security Information and Event Management) CISA (Cybersecurity and Infrastructure security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
下载PDF
A hierarchical algorithm for cyberspace situational awareness based on analytic hierarchy process 被引量:8
18
作者 胡威 Li Jianhua Jiang Xinghao Zhang Yueguo Chen Xiuzhen 《High Technology Letters》 EI CAS 2007年第3期291-296,共6页
The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current ... The existing network security management systems are unable either to provide users with useful security situation and risk assessment, or to aid administrators to make right and timely decisions based on the current state of network. These disadvantages always put the whole network security management at high risk. This paper establishes a simulation environment, captures the alerts as the experimental data and adopts statistical analysis to seek the vulnerabilities of the services provided by the hosts in the network. According to the factors of the network, the paper introduces the two concepts: Situational Meta and Situational Weight to depict the total security situation. A novel hierarchical algorithm based on analytic hierarchy process (AHP) is proposed to analyze the hierarchy of network and confirm the weighting coefficients. The algorithm can be utilized for modeling security situation, and determining its mathematical expression. Coupled with the statistical results, this paper simulates the security situational trends. Finally, the analysis of the simulation results proves the algorithm efficient and applicable, and provides us with an academic foundation for the implementation in the security situation 展开更多
关键词 analytic hierarchical process security management situational awareness security vulnerabilities security situation
下载PDF
A scalable model for network situational awareness based on Endsley' s situation model 被引量:1
19
作者 胡威 Li Jianhua Chen Xiuzhen Jiang Xinghao Zuo Min 《High Technology Letters》 EI CAS 2007年第4期395-401,共7页
The paper introduces the Endsley' s situation model into network security to describe the network security situation, and improves Endsley's data processing to suit network alerts. The proposed model contains the in... The paper introduces the Endsley' s situation model into network security to describe the network security situation, and improves Endsley's data processing to suit network alerts. The proposed model contains the information of incident frequency, incident time and incident space. The HoneyNet dataset is selected to evaluate the proposed model in the evaluation. The paper proposes three definitions to depict and predigest the whole situation extraction in detail, and a fusion component to reduce the influence of alert redundancy on the total security situation. The less complex extraction makes the situation analysis more efficient, and the fine-grained model makes the analysis have a better expansibility. Finally, the situational variation curves are simulated, and the evaluation results prove the situation model applicable and efficient. 展开更多
关键词 network situational awareness data fusion security situation security management
下载PDF
A multi-layered policy generation and management engine for semantic policy mapping in clouds
20
作者 Faraz Fatemi Moghaddam Philipp Wieder Ramin Yahyapour 《Digital Communications and Networks》 SCIE 2020年第1期38-50,共13页
The long awaited cloud computing concept is a reality now due to the transformation of computer generations.However,security challenges have become the biggest obstacles for the advancement of this emerging technology... The long awaited cloud computing concept is a reality now due to the transformation of computer generations.However,security challenges have become the biggest obstacles for the advancement of this emerging technology.A well-established policy framework is defined in this paper to generate security policies which are compliant to requirements and capabilities.Moreover,a federated policy management schema is introduced based on the policy definition framework and a multi-level policy application to create and manage virtual clusters with identical or common security levels.The proposed model consists in the design of a well-established ontology according to security mechanisms,a procedure which classifies nodes with common policies into virtual clusters,a policy engine to enhance the process of mapping requests to a specific node as well as an associated cluster and matchmaker engine to eliminate inessential mapping processes.The suggested model has been evaluated according to performance and security parameters to prove the efficiency and reliability of this multilayered engine in cloud computing environments during policy definition,application and mapping procedures. 展开更多
关键词 Cloud computing security security management Policy management Access control Policy mapping
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部