期刊文献+
共找到3,421篇文章
< 1 2 172 >
每页显示 20 50 100
Foreign Grain Security Mechanisms and Implications for China 被引量:1
1
作者 Shuhua CAO Lei NIE Weipeng MA 《Asian Agricultural Research》 2014年第3期1-5,10,共6页
With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grai... With constant growth of China's population and increasingly serious situation of farmland protection,the grain security has become a hot issue of China.This study firstly elaborated grain security measures in grain exporters,such as the United States,Australia,and EU,and grain importers such as Japan,South Korea and India.In line with these security measures,it analyzed implementation background of these policies.Finally,combining social and economic development situations and natural resource endowment of China,it revealed the implications of these measures for China and came up with policy recommendations for China's grain security. 展开更多
关键词 GRAIN security FOREIGN COUNTRIES China Mechanism F
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
2
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm security mechanism Computational overhead
下载PDF
Adaptive multi-channel Bayesian graph attention network for IoT transaction security
3
作者 Zhaowei Liu Dong Yang +1 位作者 Shenqiang Wang Hang Su 《Digital Communications and Networks》 SCIE CSCD 2024年第3期631-644,共14页
With the rapid advancement of 5G technology,the Internet of Things(IoT)has entered a new phase of appli-cations and is rapidly becoming a significant force in promoting economic development.Due to the vast amounts of ... With the rapid advancement of 5G technology,the Internet of Things(IoT)has entered a new phase of appli-cations and is rapidly becoming a significant force in promoting economic development.Due to the vast amounts of data created by numerous 5G IoT devices,the Ethereum platform has become a tool for the storage and sharing of IoT device data,thanks to its open and tamper-resistant characteristics.So,Ethereum account security is necessary for the Internet of Things to grow quickly and improve people's lives.By modeling Ethereum trans-action records as a transaction network,the account types are well identified by the Ethereum account classifi-cation system established based on Graph Neural Networks(GNNs).This work first investigates the Ethereum transaction network.Surprisingly,experimental metrics reveal that the Ethereum transaction network is neither optimal nor even satisfactory in terms of accurately representing transactions per account.This flaw may significantly impede the classification capability of GNNs,which is mostly governed by their attributes.This work proposes an Adaptive Multi-channel Bayesian Graph Attention Network(AMBGAT)for Ethereum account clas-sification to address this difficulty.AMBGAT uses attention to enhance node features,estimate graph topology that conforms to the ground truth,and efficiently extract node features pertinent to downstream tasks.An extensive experiment with actual Ethereum transaction data demonstrates that AMBGAT obtains competitive performance in the classification of Ethereum accounts while accurately estimating the graph topology. 展开更多
关键词 Internet of things Graph representation learning Node classification security mechanism
下载PDF
基于WS-Security构筑安全的SOAP消息调用 被引量:17
4
作者 王凡 李勇 +1 位作者 朗宝平 李程旭 《计算机应用》 CSCD 北大核心 2004年第4期121-123,126,共4页
介绍了Web Security框架以及WebService安全体系,通过一个简化的电子商务场景,详细展示了如何使用WS Security规范,实现安全的SOAP消息调用。指出了使用WS Security时,防范重传攻击的各种措施,并提出了一个简化的挑战响应模型。最后介绍... 介绍了Web Security框架以及WebService安全体系,通过一个简化的电子商务场景,详细展示了如何使用WS Security规范,实现安全的SOAP消息调用。指出了使用WS Security时,防范重传攻击的各种措施,并提出了一个简化的挑战响应模型。最后介绍了WS Security的实现和开发工具。 展开更多
关键词 WEB服务安全 WEB服务 简单对象访问协议 安全 重传攻击
下载PDF
基于SOAP协议的Web Service安全基础规范(WS-Security) 被引量:30
5
作者 石伟鹏 杨小虎 《计算机应用研究》 CSCD 北大核心 2003年第2期100-102,105,共4页
讨论了WebService现有安全解决方案存在的问题,阐述了WS Security规范的内容和架构,以及对此的解决方法;随后给出了一个在WS Security框架内进行安全信息交换的实例;最后,介绍了WS Secu rity现有的实现以及未来的发展方向。
关键词 soap WEBSERVICE 计算机网络 网络安全 安全信息交换 安全基础规范
下载PDF
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms 被引量:4
6
作者 Ming Wan Jiawei Li +2 位作者 Ying Liu Jianming Zhao Jiushuang Wang 《China Communications》 SCIE CSCD 2021年第1期130-150,共21页
Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a ... Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a significant topic because current networked control systems are supporting various critical infrastructures to offer vital utility services.By comparing with traditional IT systems,this paper first analyzes the uncontrollable cyber threats and classified attack characteristics,and elaborates the intrinsic vulnerabilities in current networked control systems and novel security challenges in future Industrial Internet.After that,in order to overcome partial vulnerabilities,this paper presents a few representative security mechanisms which have been successfully applied in today’s industrial control systems,and these mechanisms originally improve traditional IT defense technologies from the perspective of industrial availability.Finally,several popular security viewpoints,adequately covering the needs of industrial network structures and service characteristics,are proposed to combine with burgeoning industrial information technologies.We target to provide some helpful security guidelines for both academia and industry,and hope that our insights can further promote in-depth development of industrial cyber security. 展开更多
关键词 industrial cyber threats industrial characteristics VULNERABILITIES security mechanisms and viewpoints
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
7
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
A Detection Method of WLAN Security Mechanisms Based on MAC Frame Resolution 被引量:1
8
作者 LI June YUAN Kai +5 位作者 ZHOU Liang HAN Lifang LI Ling WANG Zhihao LIU Yinbin HUANG Wenbin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期93-102,共10页
Security mechanism detection is not only an important content of vulnerabilities evaluation but also the foundation of key strength test for wireless local area network (WLAN). This paper analyzes the specifications... Security mechanism detection is not only an important content of vulnerabilities evaluation but also the foundation of key strength test for wireless local area network (WLAN). This paper analyzes the specifications of WLAN security mechanisms and points out the defects in design of security mechanisms detection algorithm based on the standards. By capturing and analyzing a large number of Beacon frames from different vendor's access points (APs), we summarize the relevant fields and information elements in a Beacon frame, and present their values or status when an AP is set to every specific security mechanism. A detection algorithm of WLAN security mechanisms is proposed based on the experimental study result and the pseudo code of a reference implementation for the algorithm is designed. The validity of the algorithm is illustrated by examples, which shows it can detect every WLAN security mechanism accurately. 展开更多
关键词 IEEE 802.11 security mechanism detection algorithm MAC frame resolution vulnerabilities evaluation
原文传递
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms 被引量:1
9
作者 Tao Xu Chunxiao Yi 《Journal of Information Security》 2011年第1期1-7,共7页
With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web se... With the development and application of SOA technology, security issues of Web services based on heterogeneous platform have become increasingly prominent. The security of SOAP message is of great importance to Web service security. In order to solve the security issue of heterogeneous platforms, a security processing model named SIMSA (Security Interactive Model based on SOAP and Authentication) based on SOAP and authentication is proposed in this paper. By experimental verification, the model ensures the safety of SOAP message transmission and enhances the security of Web service in heterogeneous platforms. 展开更多
关键词 soap HETEROGENEOUS Web Service SIMSA security INTERACTION
下载PDF
Network Access Mechanisms and Security Issues under the Cloud Service Architecture
10
作者 Yonghua LIU 《International Journal of Technology Management》 2015年第6期98-100,共3页
Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number ... Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions. 展开更多
关键词 Cloud Services Access Mechanism security
下载PDF
基于WS-Security技术加密SOAP消息的应用
11
作者 毛瑞芳 《福建电脑》 2007年第2期92-93,共2页
本文基于WS-Security(Web Service Security)技术,介绍了WS-Security环境设置、加密函数、解密函数;详细介绍了如何使用WS-Security技术在Web Service中加密SOAP消息,使加密后的SOAP消息能够通过标准HTTP协议成功地传输。
关键词 WS—security soap WEB服务 XML
下载PDF
基于WS-Security的Web Service模型的安全性实现 被引量:5
12
作者 孙延鹏 吾守尔.斯拉木 傅蓉 《计算机应用与软件》 CSCD 北大核心 2005年第5期30-32,143,共4页
本文通过研究WebService现有安全解决方案存在的问题,依据WSSecurity规范的内容和框架,对现存模型的安全性提出了改进,并给出了一个能够进行安全信息交换的具体实现,最后介绍了WebService安全模型的未来发展方向。
关键词 WS-security WEB 安全性 SERVICE e模型 安全解决方案 信息交换 发展方向 安全模型
下载PDF
Security of Application System 被引量:1
13
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
Apache Axis1.1环境下WS-Security的研究与实现 被引量:4
14
作者 景建笃 《计算机工程与设计》 CSCD 北大核心 2005年第7期1925-1927,1964,共4页
SOAP构成了Web服务体系结构的通信基础,SOAP的扩展协议WS-Security是Web服务环境下最基础的安全协议,ApacheAxis是Java平台上的一个开放源码的SOAP处理机。关于Web服务的安全性研究是Web服务在实际应用中所必须解决的问题。给出了一个基... SOAP构成了Web服务体系结构的通信基础,SOAP的扩展协议WS-Security是Web服务环境下最基础的安全协议,ApacheAxis是Java平台上的一个开放源码的SOAP处理机。关于Web服务的安全性研究是Web服务在实际应用中所必须解决的问题。给出了一个基于WS-Security的安全模型,分析了ApacheAxis的消息处理机制,研究了此模型在ApacheAxis下的实现。 展开更多
关键词 Web服务 WS—security soap AXIS XML加密 XML签名
下载PDF
基于WS-Security规范的网格安全技术的研究 被引量:2
15
作者 刘思凤 贾金原 《计算机工程与科学》 CSCD 北大核心 2009年第4期87-89,共3页
本文分析了网格信息传输的机密性、完整性和不可否认性,探讨了GridGSI与WS-Security技术相融合的机制,提出了基于WS-Security规范的网格安全系统的设计思路与解决方案。
关键词 机密性 完整性 身份鉴别 soap WS-security
下载PDF
基于WS-Security的web服务安全性探讨 被引量:2
16
作者 罗洪 杨杰 《西南民族大学学报(自然科学版)》 CAS 2007年第4期941-943,共3页
传输级安全机制只能保证Web服务点到点的安全通信,但消息级安全机制能够提供Web服务端到端安全保证.文章在分析Web服务安全因素的基础上,结合WS-Security规范构建了一个基于WS-Security的web服务安全设计的原形,并对其安全性进行了分析.
关键词 WEB服务安全 soap XML加密 XML签名
下载PDF
基于WS-security的数据安全交换 被引量:2
17
作者 柳翠寅 袁继敏 韩敏 《微计算机信息》 北大核心 2007年第30期91-93,共3页
分析了协同商务中数据交换的必要性,介绍了WS-Security技术规范的特点,论述了WS-Security技术解决数据安全交换的可行性和有效性。结合汽车产业链协同商务平台与汽车制造厂内部系统进行安全数据交换的开发实践,使用WSE工具实现数据安全... 分析了协同商务中数据交换的必要性,介绍了WS-Security技术规范的特点,论述了WS-Security技术解决数据安全交换的可行性和有效性。结合汽车产业链协同商务平台与汽车制造厂内部系统进行安全数据交换的开发实践,使用WSE工具实现数据安全交换,并给出了核心代码和运行实例。 展开更多
关键词 端到端 WS-security soap消息 令牌
下载PDF
Incentive mechanism analysis of information security outsourcing based on principal-agent model
18
作者 熊强 仲伟俊 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期113-117,共5页
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien... In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent. 展开更多
关键词 principal agent information security outsourcing incentive mechanism
下载PDF
基于WS-Security框架的Web服务安全解决方案 被引量:2
19
作者 杨海斌 《电脑编程技巧与维护》 2009年第18期102-103,109,共3页
Web服务为分布式异构系统的集成提供了很好的支持,但是它在安全性方面存在的问题却使得它的应用受到限制。本文介绍了WS-Security安全框架的构成,探讨了WS-Security框架在Web服务安全性中的应用,以XFire为背景,提出了完整的Web服务安全... Web服务为分布式异构系统的集成提供了很好的支持,但是它在安全性方面存在的问题却使得它的应用受到限制。本文介绍了WS-Security安全框架的构成,探讨了WS-Security框架在Web服务安全性中的应用,以XFire为背景,提出了完整的Web服务安全解决方案。 展开更多
关键词 WS—security WEB服务 XFIRE soap
下载PDF
基于WS-Security和角色访问控制的Web服务安全性研究 被引量:4
20
作者 孙国刚 范学峰 刘卫国 《微计算机应用》 2005年第1期30-33,共4页
首先简要介绍了基于应用层和角色访问控制的Web服务安全的必要性,然后给出了一种基于WS-Se-curity协议和角色访问控制的Web服务安全设计方案,最后给出了该方案在.NET下的部分实现。当Web服务有Soap的中介体参与时,它需要的是端对端的消... 首先简要介绍了基于应用层和角色访问控制的Web服务安全的必要性,然后给出了一种基于WS-Se-curity协议和角色访问控制的Web服务安全设计方案,最后给出了该方案在.NET下的部分实现。当Web服务有Soap的中介体参与时,它需要的是端对端的消息安全,而传统的安全技术只能用来保护点时点的Web服务安全。为提供端对端的Web服务安全,在WS-Security协议和角色访问控制的基础上,本文提出了一种安全解决方案,并且给出了该方案在.NET下的部分实现。 展开更多
关键词 角色访问控制 WEB服务 WS-security .NET 端对端 消息安全 应用层 协议 点对点 安全性研究
下载PDF
上一页 1 2 172 下一页 到第
使用帮助 返回顶部