期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
太空安全的概念、源起与规则研析
1
作者 高国柱 《中国航天》 2024年第3期37-42,共6页
太空安全日益受到国际社会的关注,但“安全”一词,在不同语言背景下含义并不相同。汉语语境下的“安全”对应了英语语境下safety和security两个词汇。前者对应的是免受危险和风险,后者对应的是免受人为的威胁。联合国文件中并未使用spac... 太空安全日益受到国际社会的关注,但“安全”一词,在不同语言背景下含义并不相同。汉语语境下的“安全”对应了英语语境下safety和security两个词汇。前者对应的是免受危险和风险,后者对应的是免受人为的威胁。联合国文件中并未使用space safety这一表述,仅有少量联合国文件在特定情况下援引或提及space security,这在某种程度上暗示其与防止外空军备竞赛有一定联系。space safety这一用语的出现,表明部分西方国家开始将其安全诉求包装、隐藏于普遍性的太空安全问题中,将自身安全关切国际化,试图通过相关领域的讨论推进有利于自己的国际规则,从而冲击、淡化乃至取代防止外空军备竞赛的谈判。在推进太空安全国际规则方面,中俄与美西方一直存在尖锐对立。太空安全国际规则目前散见于联合国有关外空条约和一些国际软法中。近些年来,通过联大决议并利用联合国平台来推进太空安全规则已经成为一种潮流,但这些行为既有成功也有失败。中国已就太空安全立场做了清晰的阐释。为避免误导与混淆,对太空安全一词,应考虑其使用场合,并做适当变通处理。 展开更多
关键词 太空安全 space safety space security 国际规则 博奔
下载PDF
无线通信“N+1维”内生抗干扰理论与技术
2
作者 姚富强 朱勇刚 +1 位作者 孙艺夫 郭文龙 《Security and Safety》 2023年第3期29-43,共15页
The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently.With this focus,by leveraging the inherent characteristics of wireless communication and referrin... The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently.With this focus,by leveraging the inherent characteristics of wireless communication and referring to the principle of cyberspace endogenous security,this paper investigates the core issues of endogenous security in the electromagnetic space,namely,endogenous anti-jamming(EAJ),which can defend against unknown electromagnetic attacks effectively.Specifically,the subspace method is first adopted to establish the unified framework for the conventional spread-spectrum,intelligent,and endogenous antijamming,in which both the intrinsic development law of each technique and the internal logic between them are revealed.Then,the fundamental concept,key techniques,and development suggestions of wireless communication“N+1 dimensionality”endogenous anti-jamming are proposed to seek a disruptive breakthrough. 展开更多
关键词 Wireless communication Communication anti-jamming Endogenous antijamming Electromagnetic space security Network space security Command and control
原文传递
Secure Sensitive Data Sharing on a Big Data Platform 被引量:12
3
作者 Xinhua Dong Ruixuan Li +3 位作者 Heng He Wanwan Zhou Zhengyuan Xue Hao Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期72-80,共9页
Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.Howev... Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security. 展开更多
关键词 secure sharing sensitive data big data proxy re-encryption private space
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部