期刊文献+
共找到5,320篇文章
< 1 2 250 >
每页显示 20 50 100
Research on the Office Automation System Development and Practice based on Database Optimization and Security Enhancement Technology
1
作者 HongLan Li 《International Journal of Technology Management》 2015年第11期23-25,共3页
In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of compute... In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful. 展开更多
关键词 office Automation system database Optimization security Enhancement.
下载PDF
Research on Network Security Level Protection Measurement Strategy in the Context of Cloud Platforms
2
作者 Lin Ma 《Journal of Electronic Research and Application》 2024年第3期221-229,共9页
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak... Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them. 展开更多
关键词 Cloud platform Cyber security Level protection measurement
下载PDF
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning 被引量:2
3
作者 Yong Wang Jinsong Xi Tong Cheng 《Journal of Information Security》 2021年第1期34-55,共22页
As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of databa... As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria </span><span style="font-size:12px;font-family:Verdana;">are</span><span style="font-size:12px;font-family:Verdana;"> the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution. 展开更多
关键词 database security Threat Agent Traditional Approaches Machine Learning
下载PDF
Personality Traits and Cognitive Determinants——An Empirical Investigation of the Use of Smartphone Security Measures 被引量:6
4
作者 Jorg Uffen Nico Kaemmerer Michael H.Breitner 《Journal of Information Security》 2013年第4期203-212,共10页
In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and... In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model;cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed. 展开更多
关键词 security measures PERSONALITY TRAITS BEHAVIORAL Models Mobile security Smartphones
下载PDF
Quantitative Security Evaluation for Software System from Vulnerability Database
5
作者 Hiroyuki Okamura Masataka Tokuzane Tadashi Dohi 《Journal of Software Engineering and Applications》 2013年第4期15-23,共9页
This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, ... This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, our model considers a vulnerability life-cycle model and represents the vulnerability discovery process as a non-homogeneous Poisson process. In a numerical example, we show the quantitative measures for contents management system of an open source project. 展开更多
关键词 QUANTITATIVE security Evaluation VULNERABILITY database NON-HOMOGENEOUS POISSON Process CONTENTS Management system
下载PDF
A simplified approach to the basic principle of security measures onboard ships
6
《交通建设与管理》 2004年第5期22-24,共3页
There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one... There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one ofthe greatest threats to ships and 展开更多
关键词 A simplified approach to the basic principle of security measures onboard ships
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
7
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(database security and Protection system)
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
8
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure offerings Cloud Migration security measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Vulnerability Analysis of Wide Area Measurement System in the Smart Grid 被引量:1
9
作者 Mohd Rihan Mukhtar Ahmad M. Salim Beg 《Smart Grid and Renewable Energy》 2013年第6期1-7,共7页
The smart grid will be a power grid more “aware” of its operating state and having the ability to self-heal. These features may be incorporated into the grid by implementing a phasor measurement units based wide are... The smart grid will be a power grid more “aware” of its operating state and having the ability to self-heal. These features may be incorporated into the grid by implementing a phasor measurement units based wide area measurement system. Such a system will help in better real time monitoring and control of the grid. However, the wide area measurement system is subject to challenges with respect to its security. In this paper, a comprehensive analysis of security issues with a wide area measurement system is presented and the research efforts required to be taken are identified. Moreover, the effect of communication failure on a PMU installed system has been presented using integer linear programming. 展开更多
关键词 WIDE Area MEASUREMENT security PMU SMART GRID SMART GRID security
下载PDF
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities 被引量:1
10
作者 Man Liu Lei Yu 《Intelligent Information Management》 2022年第2期71-79,共9页
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm... Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities. 展开更多
关键词 Oracle database security Protection database Backup Disaster Recovery Colleges and Universities
下载PDF
Computer Network and Database Security Technology Optimization
11
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 Computer network and database security technology Optimized path
下载PDF
Effect of introducing an online system on the follow-up of elbow arthroplasty
12
作者 Jetske Viveen Ante Prkic +2 位作者 Bertram The Koen LM Koenraadt Denise Eygendaal 《World Journal of Orthopedics》 2016年第12期826-831,共6页
AIM To evaluate the effect of introducing a structured online follow-up system on the response rate.METHODS Since June 2015 we have set up an electronic followup system for prosthesis in orthopedic patients. This syst... AIM To evaluate the effect of introducing a structured online follow-up system on the response rate.METHODS Since June 2015 we have set up an electronic followup system for prosthesis in orthopedic patients. This system allows prospective data gathering using both online and paper questionnaires. In the past all patients received questionnaires on paper. This study includes only patients who received elbow arthroplasty. Response rates before and after introduction of the online database were compared. After the implementation,completeness of the questionnaires was compared between paper and digital versions. For both comparisons Fisher's Exact tests were used.RESULTS A total of 233 patients were included in the study. With the introduction of this online follow-up system,the overall response rate increased from 49.8% to 91.6%(P < 0.01). The response rate of 92.0% in the paper group was comparable to 90.7% in the online group(P > 0.05).Paper questionnaires had a completeness of 54.4%,which was lower compared to the online questionnaires where we reached full completeness(P < 0.01). Furthermore,non-responders proved to be younger with a mean age of 52 years compared to a mean age 62 years of responders(P < 0.05).CONCLUSION The use of a structured online follow-up system increased the response rate. Moreover,online questionnaires are more complete than paper questionnaires. 展开更多
关键词 PATIENT reported OUTCOME measures ELBOW FOLLOW-UP ARTHROPLASTY Online database
下载PDF
Security Research on Engineering Database System
13
作者 REN Jian-ping 1,2, SONG Han-tao 2, LIANG Yun-rong 2 (1. North China Institute of Technology, Taiyuan 030051, China 2. Beijing Institute of Technology, Beijing 100081, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期288-289,共2页
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma... Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments. 展开更多
关键词 engineering database management system (EDBMS) s ecurity agent security level
下载PDF
Soil Database Management Software Development for Optimizing Land Resource Information Utilization to Support National Food Security
14
作者 Rizatus Shofiyati Saefoel Bachri 《Journal of Geographic Information System》 2011年第3期211-216,共6页
Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to ... Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to manage such a large amount of data, i.e.: Side & Horizon (SHDE4), Soil Sample Analysis (SSA), and Land Unit in dbf file, while Site and Horizon is in DataEase formats. The database contains soil physics and chemical property data of each soil horizon from surface to effective soil depth, climate, land surface condi- tions, and other parameters required for soil classification. Currently, database management software for land resources is still based on DOS and is stand alone. The system is not efficient and effectively used as Agri- cultural Land Resource Information System. At present, as a key component of this system requires review and development of new database software is compatible with the development of information technology. This paper explains about development of interactive agricultural land resources information system for op- timizing land resources data utilization. Hopefully, the software can give contributions in national Agricul- tural Land Resources System Information development for supporting food security. 展开更多
关键词 SOIL database Software DEVELOPMENT LAND RESOURCES Information FOOD security
下载PDF
Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method
15
作者 Wenshu Xu Mingwei Lin 《Computers, Materials & Continua》 SCIE EI 2023年第10期199-222,共24页
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform... Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better. 展开更多
关键词 Multi-criteria decision-making distance measure probabilistic linguistic term sets industrial control system information security assessment
下载PDF
Biometrics as a Matrix: The Short Distance between Crime and Security Systems, Prompting an Artificial Intelligence to Invent Electronic Biometrics ID!
16
作者 Ahmed Laarfi 《International Journal of Intelligence Science》 2022年第1期1-8,共8页
This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio</span><span style="font-family:Verdana;">metrics... This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio</span><span style="font-family:Verdana;">metrics ID. This way, distributed databases contain imperative data from</span></span><span style="font-family:""> </span><span style="font-family:Verdana;">much helpful information that </span><span style="font-family:Verdana;">supports</span><span style="font-family:Verdana;"> more security. We reviewed examples of what these databases would look like, which any responsible party could design to be global. As will be mentioned later, we obtain common international databases whose data </span><span style="font-family:Verdana;">are</span><span style="font-family:""><span style="font-family:Verdana;"> modified according to factors such as </span><span style="font-family:Verdana;">the owner of the device, the location of the device, and so on. This is very</span><span style="font-family:Verdana;"> useful for tracking, and it combines biometrics with data set to give us a comprehensive electronic identification. 展开更多
关键词 BIOMETRICS security PRIVACY Distributed system databaseS
下载PDF
Research and Application of Meteorological Response Measures for Civil Engineering and Data Acquisition System
17
作者 Dawei XU Zhimin ZHANG Feng PAN 《Meteorological and Environmental Research》 CAS 2023年第3期54-59,共6页
Meteorological conditions have a very important impact on the development of construction projects.In order to assist project site managers to quickly and accurately deal with the engineering risks brought by meteorol... Meteorological conditions have a very important impact on the development of construction projects.In order to assist project site managers to quickly and accurately deal with the engineering risks brought by meteorological conditions,meteorological risk assessment indicators for civil construction are established based on the actual impact of different meteorological conditions on each sub-project of civil engineering.A meteorological intelligent management system is created,and it will select reasonable countermeasures from the integrated existing database and push them to on-site construction managers based on meteorological risk assessment indicators.Through the pre-set construction log module,the managers can give feedback on the application effect of the pushed measures,and achieve the effect of construction data collection,correction and expansion of the existing database. 展开更多
关键词 METEOROLOGY Construction measures database Information collection Management system
下载PDF
Research on the teaching reform of the university computer database
18
作者 GENG Tao 《International English Education Research》 2015年第12期1-3,共3页
Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. O... Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. On the basis of a comprehensive grasp of the concepts and principles, combined with the actual applications, the students will understand the development trend, and unceasingly enhance the level of the database knowledge, which has great benefits for training the comprehensive talents. In this paper, by analyzing the problems existing in the database courses, the author of this paper put forward the ideas and measures for the reform of the relevant curriculums. 展开更多
关键词 database teaching reform measures
下载PDF
Analysis on the Influencing Factors and Control Measures of "Non-Grain Conversion" of Cultivated Land in Agricultural Land Transfer
19
作者 Lixian XIA Zisheng YANG 《Asian Agricultural Research》 2021年第10期5-11,共7页
Through the method of literature analysis,this paper analyzes the present situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land in China,summarizes the influencing fac... Through the method of literature analysis,this paper analyzes the present situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land in China,summarizes the influencing factors and consequences of the phenomenon of"non-grain conversion"of cultivated land in the transfer of agricultural land,and finally puts forward some measures.The study found that costs and benefits are the fundamental factors affecting the"non-grain conversion"of cultivated land in agricultural land transfer,and other main factors include government and policy guidance,industrial and commercial capital to the countryside,labor transfer and so on.The"non-grain conversion"of cultivated land in the transfer of agricultural land is a serious threat to China s food security,leading to the decline of the quality of agricultural land and the destruction of the ecological environment,as well as the risk of breach of contract in"industrial and commercial capital to the countryside".Based on the understanding of the influencing factors of non-grain conversion,this paper puts forward the following measures:strengthening the control of the use of cultivated land in agricultural land transfer;implementing accurate subsidies for grain cultivation and ensuring the benefit of grain growers;adopting grain planting incentive mechanism to increase grain enthusiasm;strengthening media publicity and education to enhance food security awareness.The improvement of the current situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land will be of great significance to the protection of agricultural land and food security in China. 展开更多
关键词 Agricultural land transfer Non-grain conversion of cultivated land Food security Influencing factors measures
下载PDF
Research on the teaching reform of the university computer database
20
作者 Geng Tao 《International English Education Research》 2015年第11期90-92,共3页
Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. O... Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. On the basis of a comprehensive grasp of the concepts and principles, combined with the actual applications, the students will understand the development trend, and unceasingly enhance the level of the database knowledge, which has great benefits for training the comprehensive talents. In this paper, by analyzing the problems existing in the database courses, the author of this paper put forward the ideas and measures for the reform of the relevant curriculums. 展开更多
关键词 database teaching reform measures
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部