期刊文献+
共找到437,989篇文章
< 1 2 250 >
每页显示 20 50 100
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
1
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
2
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Influence of Quantum Information Technology on International Security
4
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
下载PDF
A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality
5
作者 Mohammed Hussein Kurdi Mohsen Denden David Paul 《Journal of Information Security》 2024年第2期218-231,共14页
Information security and quality management are often considered two different fields. However, organizations must be mindful of how software security may affect quality control. This paper examines and promotes metho... Information security and quality management are often considered two different fields. However, organizations must be mindful of how software security may affect quality control. This paper examines and promotes methods through which secure software development processes can be integrated into the Systems Software Development Life-cycle (SDLC) to improve system quality. Cyber-security and quality assurance are both involved in reducing risk. Software security teams work to reduce security risks, whereas quality assurance teams work to decrease risks to quality. There is a need for clear standards, frameworks, processes, and procedures to be followed by organizations to ensure high-level quality while reducing security risks. This research uses a survey of industry professionals to help identify best practices for developing software with fewer defects from the early stages of the SDLC to improve both the quality and security of software. Results show that there is a need for better security awareness among all members of software development teams. 展开更多
关键词 Cyber security Development Methodology information Quality Human-Centric SDLC Quality Assurance
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
6
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges Network information security Protection status COUNTERMEASURES
下载PDF
Sensitive Information Security Based on Elliptic Curves
7
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY Elliptic Curves Digital security Data Sensitive Data IMPLEMENTATION
下载PDF
Incentive mechanism analysis of information security outsourcing based on principal-agent model
8
作者 熊强 仲伟俊 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期113-117,共5页
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien... In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent. 展开更多
关键词 principal agent information security outsourcing incentive mechanism
下载PDF
Security investment and information sharing for complementary firms with heterogeneous monetary loss
9
作者 蔡传晰 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2017年第2期241-248,共8页
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a... Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable. 展开更多
关键词 complementary firm contest success function security investment information sharing leakage cost
下载PDF
Optimization and coordination model of information system security investment for interdependent risk
10
作者 顾建强 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期288-293,共6页
The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium lev... The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare. 展开更多
关键词 interdependent risk cyber security insurance SELF-PROTECTION COORDINATION
下载PDF
Reflections and Improvements on China’s Asset-Backed Securities Information Disclosure System
11
作者 Zhao Mingxin 《Contemporary Social Sciences》 2024年第1期122-136,共15页
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s... Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures. 展开更多
关键词 asset-backed securities asset securitization information disclosure
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
12
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD DATA information Model Data Storage Cloud Computing security System Data Encryption
下载PDF
Geographical Information System-Based Assessment of Ecological Security in Changbai Mountain Region 被引量:7
13
作者 LU Xing-chang ZHANG Ji-quan LI Xiao-zhen 《Journal of Mountain Science》 SCIE CSCD 2014年第1期86-97,共12页
Ecological security defined as the creation of a condition where the physical surroundings of a community provide for the needs of its inhabitants without diminishing its natural stock,which is important for regional ... Ecological security defined as the creation of a condition where the physical surroundings of a community provide for the needs of its inhabitants without diminishing its natural stock,which is important for regional security and social stability.In recent years,land use patterns in the Changbai Mountain region have changed significantly with intensive human activities,and consequently led to increasing problems in regional ecological security.Based on the Pressure-State-Impact-Response(PSIR) model and the mathematical method of catastrophe progression supported by geographical information system(GIS),the ecological security situation of the study area under land use and cover change(LUCC) was evaluated.The results indicated that the ecological security in Changbai Mountain region varied nonlinearly,which got better from 1990 to 2000 but became worse from 2000 to 2007,the ecological security levels in Changbai Mountain region were mainly medium and medium to low during the past 17 years,with higher values of Ecological Security Index(ESI) in the central region and lower values in the east and west,the ecological security situation was more serious in the settlements and river valleys,where the LUCC was most remarkable. 展开更多
关键词 ECOLOGICAL security Pressure-State-Impact-Response Land use and COVER change GEOGRAPHICAL information System(GIS) CATASTROPHE PROGRESSION Changbai MOUNTAIN
下载PDF
Survey on Quantum Information Security 被引量:3
14
作者 Huanguo Zhang Zhaoxu Ji +1 位作者 Houzhen Wang Wanqing Wu 《China Communications》 SCIE CSCD 2019年第10期1-36,共36页
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which off... The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which offers unconditional security based on some principles of quantum mechanics, has become a significant branch and hotspot in the field of modern cryptography research. In this paper, we review the research and development of several important and well-studied branches of quantum cryptography in terms of theory and experiment, including quantum key distribution, quantum secret sharing, quantum secure direct communication, quantum signature, and quantum private query. We also briefly review the research and development of some other branches which are currently in the stage of theoretical research but receive widespread concern from academia, including quantum private comparison, quantum anonymous voting, quantum secure multi-party summation, quantum sealed-bid auction, quantum public key cryptosystem, quantum key agreement, quantum dialogue, and quantum identity authentication. In addition, we discuss some open issues and future research directions for the branches referred to above. 展开更多
关键词 QUANTUM information information security QUANTUM CRYPTOGRAPHY QUANTUM KEY distribution
下载PDF
Research on Assessment Model of Information System Security Based on Various Security Factors 被引量:5
15
作者 林梦泉 朱赟 +1 位作者 王强民 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第3期405-409,共5页
With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit... With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM. 展开更多
关键词 information system security factors five-attribute model(FAM) risk assessment
下载PDF
Wireless Physical Layer Security with Imperfect Channel State Information: A Survey 被引量:5
16
作者 Biao He Xiangyun Zhou Thushara D.Abhayapala 《ZTE Communications》 2013年第3期11-19,共9页
Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for ... Physical layer security is an emerging technique for improving wireless communication security, which is widely regarded as a complement to cryptographic technologies. To design physical layer security techniques for practical scenarios, uncertainty and imperfections in the channel knowledge need to be taken into account. This paper is a survey of recent research on physical layer security that considers imperfect channel state information (CSI) at communication nodes. We first give an overview of the main information-theoretic measures of secrecy performance with imperfect CSI. Then, we describe several signal processing enhancements in secure transmission designs. These enhancements include secure on-off transmission, beamforming with artificial noise, and secure communication assisted by relay nodes or in cognitive radio systems. Recent studies of physical layer security in large-scale decentralized wireless networks are also summarized. Finally, open problems for on-going and future research are discussed. 展开更多
关键词 physical layer security fading channels channel uncertainty imperfect channel state information
下载PDF
Information Flow Security Models for Cloud Computing 被引量:3
17
作者 Congdong Lv Ji Zhang +1 位作者 Zhoubao Sun Gang Qian 《Computers, Materials & Continua》 SCIE EI 2020年第12期2687-2705,共19页
Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between u... Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between users and virtual machines.Whether direct or indirect data leakage,it can be regarded as illegal information flow.Methods,such as access control models can control the information flow,but not the covert information flow.Therefore,it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture.Typical noninterference models are not suitable to certificate information flow in cloud computing architecture.In this paper,we propose several information flow models for cloud architecture.One model is for transitive cloud computing architecture.The others are for intransitive cloud computing architecture.When concurrent access actions execute in the cloud architecture,we want that security domain and security domain do not affect each other,that there is no information flow between security domains.But in fact,there will be more or less indirect information flow between security domains.Our models are concerned with how much information is allowed to flow.For example,in the CIP model,the other domain can learn the sequence of actions.But in the CTA model,the other domain can’t learn the information.Which security model will be used in an architecture depends on the security requirements for that architecture. 展开更多
关键词 Cloud computing security information flow security NONINTERFERENCE noninterference models
下载PDF
Security information factor based airborne radar RF stealth 被引量:9
18
作者 Fei Wang Mathini Sellathurai +1 位作者 Weigang Liu Jiangjiang Zhou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期258-266,共9页
Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, ... Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, such as Schleher interception factor, which makes it difficult to evaluate radar RF stealth technologies if interceptor parameters are unknown. In communication, security capacity has been presented to describe the possible ability to communicate in complete security. Since the essential of the secu- rity capacity is to have the interceptor get none valued information from the emitter, this paper is proposed to study security infor- mation factors taking advantage of mutual information to evaluate radar RF stealth under some conditions. Through analyzing mutual information obtained by the radar and the interceptor, this paper defines the security information factor with and without cooperative jamming. Furthermore, this paper deduces the ratio of the match filter to the match incoherent filter and discuss mutual information received by the interceptor. Numerical simulations illustrate radar RF stealth effects based on the security information factor concept under different conditions. 展开更多
关键词 mutual information radar signal STEALTH
下载PDF
Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT 被引量:3
19
作者 Jinxin Zuo Yueming Lu +3 位作者 Hui Gao Ruohan Cao Ziyv Guo Jim Feng 《Computers, Materials & Continua》 SCIE EI 2020年第10期683-704,共22页
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this pape... The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network urgently.In this paper,we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback.The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection.Firstly,we establish an overall evaluation indicator system that includes four primary indicators of threat information,asset,vulnerability,and management,respectively.It also includes eleven secondary indicators of system protection rate,attack detection rate,confidentiality,availability,controllability,identifiability,number of vulnerabilities,vulnerability hazard level,staff organization,enterprise grading and service continuity,respectively.Then,we build the core algorithm to enable the evaluation model,wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value.Moreover,in order to better supervise the performance of the proposed evaluation model,we present four novel indicators includes residual risk,continuous conformity of residual risk,head-to-tail consistency and decrease ratio,respectively.Simulation results show the advantages of the proposed model in the evaluation of information security for IoT. 展开更多
关键词 IOT information security quantitative evaluation safety score residual risk
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
20
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部