期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
信息体安全
1
作者 何桂立 《电信网技术》 2004年第10期56-58,共3页
介绍了信息体安全的概念,信息体安全的法律保障及保证信息体安全应考虑的环节。
关键词 信息体安全 法律保障 认证 加密
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
2
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
Indirect Watermarking
3
作者 钟计东 黄上腾 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期26-29,共4页
Watermariding system is a complex system requiring both expertise and specialized techniques with security concems.Thus to relieve the multimedia manufactures of the complexities of desgning complicated watermarking s... Watermariding system is a complex system requiring both expertise and specialized techniques with security concems.Thus to relieve the multimedia manufactures of the complexities of desgning complicated watermarking systems,this paper presents a new watermarking model in which watermaiking is provided as a kind of service by the specialized watermarking companies.In order to make this service model work,a simple permutation scheme to hide the true contents is proposed.The paper also proves the security of the scheme against the attacks from the watermarking companies.Finally ,the effectiveness of the scheme is demonstrated through experiments. 展开更多
关键词 WATERMARKING multimedia security watermarkingservice pernuaation.
下载PDF
Research on Network Platform of Information Management and Security
4
作者 Xiang Xin 《International Journal of Technology Management》 2013年第2期107-109,共3页
With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of netwo... With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance. 展开更多
关键词 information security real-time monitoring network security
下载PDF
DEA-based Empirical Research on the Performance Analysis of China's Commercial Bank Information Security System Application
5
作者 Xinghua LU 《International Journal of Technology Management》 2013年第6期35-38,共4页
In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super... In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded. 展开更多
关键词 DEA Operating Performance Empirical Research
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部