期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
A Multilevel Secure Relation-Hierarchical Data Model for a Secure DBMS
1
作者 朱虹 冯玉才 《Journal of Modern Transportation》 2001年第1期8-16,共9页
A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lowe... A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lower layer relationalintegrity is presented after we analyze and eliminate the covert channels caused by the database integrity.Two SQL statements are extended to process polyinstantiation in the multilevel secure environment.The system based on the multilevel secure relation hierarchical data model is capable of integratively storing and manipulating complicated objects ( e.g. , multilevel spatial data) and conventional data ( e.g. , integer, real number and character string) in multilevel secure database. 展开更多
关键词 DATABASES data structure data models secure DBMS covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level integrity cluster index
下载PDF
A Message-Level Security Model Consisting of Multiple Security-Tokens Mechanism 被引量:1
2
作者 LIU Zhenpeng SONG Xiaojing +2 位作者 TANG Wansheng CHANG Xiaomeng ZHOU Dongdong 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期1-4,共4页
Current Web services architectures are confronted with a few stubborn problems, and the security problem becomes one of the bottlenecks that restrict the extensive application of Web service. After compared transport ... Current Web services architectures are confronted with a few stubborn problems, and the security problem becomes one of the bottlenecks that restrict the extensive application of Web service. After compared transport level with message level security, the limitation of transport level security became clearly. And then on the basis of the analysis message level security, especially WS-Security, XML security protocol was adopted to guarantee message level security. Because WS-Security is a new protocol jointly developed by Microsoft and IBM among these XML security protocols, and a security-token mechanism of WS-Security mechanism was improved, added a table with security-token types. And a new model consisting of multiple security-token is put forward to guarantee the security of message transmission. 展开更多
关键词 Web service message level security WS-SECURITY security-token
下载PDF
Water Security-based Hydrological Regime Assessment Method for Lakes with Extreme Seasonal Water Level Fluctuations:A Case Study of Poyang Lake,China 被引量:2
3
作者 WAN Rongrong YANG Guishan +2 位作者 DAI Xue ZHANG Yanhui LI Bing 《Chinese Geographical Science》 SCIE CSCD 2018年第3期456-469,共14页
Extreme seasonal water level fluctuations characterize natural floodplain lakes in monsoon regions, which are crucial for ensuring lake water security, including flood prevention water supply and health of aquatic eco... Extreme seasonal water level fluctuations characterize natural floodplain lakes in monsoon regions, which are crucial for ensuring lake water security, including flood prevention water supply and health of aquatic ecosystem. In order to achieve this goal, we established a hydrological regime assessment method based on a set of hydrological indicators for lakes with heavy seasonal water level fluctuations. The results suggest that time-sensitive hydrological indicators and specific time scales for various water security aspects must be considered. We discovered that it is more practical and meaningful to combine the water level classification derived from statistical analyses with characteristic hydrological values linked to water security. The case study of Poyang Lake results show that there are no discernable trends of Poyang Lake water regime status over the last 35 years, and the two periods of poor status are in accordance with climate variation in the lake basin area. Scholars and policy makers should focus on both floods and droughts, which are the main water security problems for Poyang Lake. It is hoped that this multi-scale and multi-element hydrological regime assessment method will provide new guidelines and methods for other international scholars of river and lake water assessment. 展开更多
关键词 lake water regime assessment water security seasonal water level fluctuations natural lakes Poyang Lake
下载PDF
Study on Mandatory Access Control in a Secure Database Management System
4
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance INTEGRITY cluster
下载PDF
Application of Security Index in Evaluation of Agricultural Insurance Security Level
5
作者 Xuan ZUO Qiao ZHANG Ke WANG 《Asian Agricultural Research》 2018年第2期39-41,共3页
At present,there is still no unified standard for evaluation of agricultural insurance security level,especially in the quantitative evaluation. In order to explore a scientific and reasonable evaluation method for ag... At present,there is still no unified standard for evaluation of agricultural insurance security level,especially in the quantitative evaluation. In order to explore a scientific and reasonable evaluation method for agricultural insurance security level,this paper analyzed the current situation of evaluation methods of social insurance,endowment insurance and medical insurance,as well as the application of security index. It is expected to provide a certain reference for evaluation of agricultural insurance security level by the agricultural insurance security index. 展开更多
关键词 Agricultural Insurance Security level EVALUATION Security index
下载PDF
Design of secure operating systems with high security levels 被引量:5
6
作者 QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
Dynamic Change of Arable Land Ecological Security: A Case Study of Panyu District, Guangzhou City 被引量:1
7
作者 YAO Yiying WU Dafang +1 位作者 LIU Yanyan LIU Yihua 《Journal of Landscape Research》 2015年第6期42-48,52,共8页
Ecological security of arable land is closely related to grain security and social stability. This paper took 12 typical indexes from the aspects of ecological pressure, state and response of arable land considering n... Ecological security of arable land is closely related to grain security and social stability. This paper took 12 typical indexes from the aspects of ecological pressure, state and response of arable land considering natural, social and economic conditions to construct the ecological index system of arable land in Panyu District, Guangzhou City, and adopted objective weighting method and comprehensive analysis method to analyze the dynamic change of ecological security and security level of arable land in the study area. The results showed that ecological security pressure value and response value of arable land in Panyu District from 2008 to 2013 increased and the overall ecological security level was low, manifesting the level of "sensitive–risky–sensitive". Specifi cally, ecological security of arable land in 2008 was sensitive, risky from 2009 to 2011, and the security level rose to the sensitive level again in 2012 and 2013. Ecological restoration and rebuilding of arable land should be enhanced, and ecological security early warning system should be established by protecting quantity and quality of arable land, so as to protect arable land resources effectively, and promote sustainable development of arable land. 展开更多
关键词 Arable land resources Ecological security Assessment index system Security level Panyu District
下载PDF
Security Research on Engineering Database System
8
作者 REN Jian-ping 1,2, SONG Han-tao 2, LIANG Yun-rong 2 (1. North China Institute of Technology, Taiyuan 030051, China 2. Beijing Institute of Technology, Beijing 100081, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期288-289,共2页
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma... Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments. 展开更多
关键词 engineering database management system (EDBMS) s ecurity agent security level
下载PDF
Blockchain applied to the construction supply chain:A case study with threat model 被引量:2
9
作者 Gjorgji SHEMOV Borja GARCIA de SOTO Hoda ALKHZAIMI 《Frontiers of Engineering Management》 2020年第4期564-577,共14页
The construction industry has long faced the challenge of introducing collaborative systems among multiple stakeholders.This challenge creates a high level of rigidity in terms of processing shared information related... The construction industry has long faced the challenge of introducing collaborative systems among multiple stakeholders.This challenge creates a high level of rigidity in terms of processing shared information related to different processes,robust holistic regulations,payment actualizations,and resource utilization across different nodes.The need for a digital platform to crossconnect all stakeholders is necessary.A blockchain-based platform is a prime candidate to improve the industry in general and the construction supply chain(CSC)in particular.In this paper,a literature review is presented to establish the main challenges that CSC faces in terms of its effects on productivity and efficiency.In addition,the effect of applying blockchain platforms on a case study is presented and analyzed from performance and security level.The analysis aims to emphasize that blockchain,as presented in this paper,is a viable solution to the challenges in the CSC regardless of the risks associated with the security and robustness of the flow of information and data protection.Moreover,a threat analysis of applying a blockchain model on the CSC industry is introduced.This model indicates potential attacks and possible countermeasures to prevent the attacks.Future work is needed to expand,quantify,and optimize the threat model and conduct simulations considering proposed countermeasures for the different blockchain attacks outlined in this study. 展开更多
关键词 blockchain taxonomy construction supply chain threat model analysis security level analysis CYBERSECURITY VULNERABILITY smart contract cyber-attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部