期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
民用支线飞机机载网络信息安保设计技术研究
1
作者 肖君 《价值工程》 2024年第4期103-105,共3页
本文通过介绍民用支线飞机设计时采用的机载网络概念,通过研究机载网络信息安保设计的特点,结合国内民机研制已有的经验,建立适合民用支线飞机的信息安保设计通用要求,给民用飞机机载系统网络信息安保功能设计提供一些参考。
关键词 民用支线飞机 信息安保 机载网络
下载PDF
校园安保信息化管理系统的开发和应用
2
作者 陆金江 张成叔 《山西大同大学学报(自然科学版)》 2021年第6期19-22,共4页
信息技术的发展为安保管理工作提供了更便捷、更高效的处理模式。与校园原有的安保系统进行信息集成,采用B/S架构、Oracle数据库开发了安保信息化管理系统。系统可实现员工信息管理、门禁信息管理、安保组织管理、流程管理、安保档案管... 信息技术的发展为安保管理工作提供了更便捷、更高效的处理模式。与校园原有的安保系统进行信息集成,采用B/S架构、Oracle数据库开发了安保信息化管理系统。系统可实现员工信息管理、门禁信息管理、安保组织管理、流程管理、安保档案管理等功能。系统操作便捷、权级分明、运行稳定,能够极大程度提高校园安保管理的效率,为安保信息化的实现提供保障。 展开更多
关键词 安保信息管理 B/S架构 信息化系统 流程管理
下载PDF
面向移动应用的高校安保信息化集成平台构建 被引量:1
3
作者 魏李方 《电子技术与软件工程》 2019年第24期200-201,共2页
本文针对学校安保信息系统维护任务繁重、基础数据更新不及时及师生办理安保业务不方便的问题,引入使用云计算、数据库同步技术及移动互联网等技术,将安保信息系统迁移到学校云管理平台、将安保信息化集成平台和学校数据中心使用ODI数... 本文针对学校安保信息系统维护任务繁重、基础数据更新不及时及师生办理安保业务不方便的问题,引入使用云计算、数据库同步技术及移动互联网等技术,将安保信息系统迁移到学校云管理平台、将安保信息化集成平台和学校数据中心使用ODI数据集成平台进行数据同步、整合多个安保信息系统高频应用功能并开发面向移动应用的安保信息化集成平台。实际运行表明,安保信息化集成平台简化了学校安保信息系统运维工作,方便了师生使用安保业务,达到了预期目的。 展开更多
关键词 安保信息 云计算 数据库同步技术 ODI 移动应用
下载PDF
达州某看守所武警中队执勤安保信息系统设计
4
作者 沈亚 《现代建筑电气》 2022年第2期34-38,共5页
为解决达州某看守所武警中队执勤安保信息系统存在的信息孤岛的问题,提出了一种可行的解决方案,综合运用视频监控、人工智能、大数据、融合通信、可视化等技术,建设“武警磐石”执勤安保信息平台,打通信息孤岛,使各子系统互联互通,数据... 为解决达州某看守所武警中队执勤安保信息系统存在的信息孤岛的问题,提出了一种可行的解决方案,综合运用视频监控、人工智能、大数据、融合通信、可视化等技术,建设“武警磐石”执勤安保信息平台,打通信息孤岛,使各子系统互联互通,数据可以共享使用。 展开更多
关键词 安保信息系统 安保信息 武警磐石平台 AI智能分析
下载PDF
建筑智能化系统在安保配套信息化中的应用及优化
5
作者 郑敏伟 《智能建筑与智慧城市》 2021年第12期143-144,共2页
智能监控系统在安防智能化系统中占据重要地位,可以从整体上提升建筑工程的安全性。文章将对建筑智能化系统在安保配套信息化中的不足之处进行具体讨论,提出合理优化策略。
关键词 建筑智能化系统 安保配套信息 应用
下载PDF
信息栅格技术发展浅析 被引量:5
6
作者 阮飞 王源 《中国电子科学研究院学报》 2011年第2期165-169,共5页
介绍了美军全球信息栅格计划发展概况,并对通信基础设施关键技术、计算基础设施关键技术、支撑服务技术、信息安保技术和资源管控技术等信息栅格技术的概念内涵、技术特点、应用前景等方面进行了系统阐述。
关键词 信息栅格 全球信息栅格 基础设施 支撑服务 信息安保 资源管控
下载PDF
我国民航公安警务信息化建设及立法规制 被引量:3
7
作者 张君周 《铁道警察学院学报》 2018年第2期16-20,共5页
近些年,我国民航运输发展迅猛,旅客吞吐量大幅度增加,对民航公安机关警务工作提出了挑战。民航运输产生大量的数据与信息,也高度依赖这些信息、数据,因此"信息化建设"是解决这一挑战的有效手段。民航公安机关警务信息化建设,... 近些年,我国民航运输发展迅猛,旅客吞吐量大幅度增加,对民航公安机关警务工作提出了挑战。民航运输产生大量的数据与信息,也高度依赖这些信息、数据,因此"信息化建设"是解决这一挑战的有效手段。民航公安机关警务信息化建设,既是顺应公安警务信息化建设以及民航信息化建设的大势所趋,也是落实国际民航组织对各缔约国提出的信息化建设要求,更是为了满足实际工作的需要。当前,民航公安机关根据行业特点与需求,已全面加强了信息化建设,并通过建章立制规范安保信息管理,推进警务信息化的快速发展。 展开更多
关键词 航空警务 信息化建设 安保信息 大数据 立法
下载PDF
用设计实现信息安全
8
作者 华镕 《仪器仪表标准化与计量》 2016年第3期23-25,44,共4页
通过设计实现信息安全的七个基本原则如下:1.主动而不是被动;预防而不是补救;2.把安保作为默认设置;3.把安保嵌入进设计;4.正和而非零和;5.端到端全生命周期的安保;6.可视性和透明度;7.以人为本。
关键词 信息安全(安保) 设计生命周期
下载PDF
面向数字化飞机的接入认证系统设计 被引量:1
9
作者 张军才 茹伟 胡宇凡 《信息通信》 2019年第2期243-245,共3页
数字化飞机需要与众多的系统和设备进行数据通信,如何实现数字化飞机的安全接入和认证成为飞机制造商重点关注的问题。基于飞机的运营和维护流程,识别了数字化飞机进行接入认证的工作场景,分析了接入认证系统的需求,设计了机载和地面接... 数字化飞机需要与众多的系统和设备进行数据通信,如何实现数字化飞机的安全接入和认证成为飞机制造商重点关注的问题。基于飞机的运营和维护流程,识别了数字化飞机进行接入认证的工作场景,分析了接入认证系统的需求,设计了机载和地面接入认证系统的架构,并定义了接入认证过程。研究结果可以作为航电系统专业人员的设计参考。 展开更多
关键词 数字化飞机 机载系统 信息安保 接入认证
下载PDF
Applying two channels to vector space secret sharing based multi-signature scheme 被引量:1
10
作者 肖清华 平玲娣 +1 位作者 陈小平 潘雪增 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期56-62,共7页
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat... Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme. 展开更多
关键词 Vector space secret sharing MULTI-SIGNATURE Discrete logarithm Chinese remainder theorem
下载PDF
Research on Assessment Model of Information System Security Based on Various Security Factors 被引量:5
11
作者 林梦泉 朱赟 +1 位作者 王强民 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第3期405-409,共5页
With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit... With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM. 展开更多
关键词 information system security factors five-attribute model(FAM) risk assessment
下载PDF
Research on Network Platform of Information Management and Security
12
作者 Xiang Xin 《International Journal of Technology Management》 2013年第2期107-109,共3页
With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of netwo... With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance. 展开更多
关键词 information security real-time monitoring network security
下载PDF
ε-inclusion: privacy preserving re-publication of dynamic datasets
13
作者 Qiong WEI Yan-sheng LU Lei ZOU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1124-1133,共10页
This paper presents a novel privacy principle, ε-inclusion, for re-publishing sensitive dynamic datasets. ε-inclusion releases all the quasi-identifier values directly and uses permutation-based method and substitut... This paper presents a novel privacy principle, ε-inclusion, for re-publishing sensitive dynamic datasets. ε-inclusion releases all the quasi-identifier values directly and uses permutation-based method and substitution to anonymize the microdata. Combined with generalization-based methods, ε-inclusion protects privacy and captures a large amount of correlation in the microdata. We develop an effective algorithm for computing anonymized tables that obey the ε-inclusion privacy requirement. Extensive experiments confirm that our solution allows significantly more effective data analysis than generalization-based methods. 展开更多
关键词 Privacy preservation Re-publication ε-inclusion Privacy principle
下载PDF
The Information Security of Digital Control Systems for Nuclear Power Plants
14
作者 Nadir Mengazetdinov Alexey Poletykin Vitaly G. Promyslov 《Journal of Energy and Power Engineering》 2012年第5期744-754,共11页
The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper... The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level. 展开更多
关键词 SECURITY instrumentation and control system expert system nuclear plant.
下载PDF
Three-step semiquantum secure direct communication protocol 被引量:12
15
作者 ZOU XiangFu QIU DaoWen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第9期1696-1702,共7页
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only w... Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only when both parties are quantum.In this paper,we construct a three-step semiquantum secure direct communication(SQSDC)protocol based on single photon sources in which the sender Alice is classical.In a semiquantum protocol,a person is termed classical if he(she)can measure,prepare and send quantum states only with the fixed orthogonal quantum basis{|0,|1}.The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption.Therefore,the proposed SQSDC protocol is also completely robust.Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol.In the proposed protocol,we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed.Moreover,the proposed SQSDC protocol can be implemented with the existing techniques.Compared with many quantum secure direct communication protocols,the proposed SQSDC protocol has two merits:firstly the sender only needs classical capabilities;secondly to check Eves disturbing after the transmission of quantum states,no additional classical information is needed. 展开更多
关键词 quantum secure direct communication semiquantum complete robustness security
原文传递
Preserving privacy information flow security in composite service evolution
16
作者 Huan-feng PENG Zhi-qiu HUANG +3 位作者 Lin-yuan LIU Yong LI Da-juan FAN Yu-qing WANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第5期626-638,共13页
After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. W... After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. We propose an approach to preserve privacy information flow security in composite service evolution. First, a privacy data item dependency analysis method based on a Petri net model is presented. Then the set of privacy data items collected by each component service is derived through a privacy data item dependency graph, and the security scope of each component service is calculated. Finally, the evolution operations that preserve privacy information flow security are defined. By applying these evolution operations, the re-verification process is avoided and the evolution efficiency is improved. To illustrate the effectiveness of our approach, a case study is presented. The experimental results indicate that our approach has high evolution efficiency and can greatly reduce the cost of evolution compared with re-verifying the entire composite service. 展开更多
关键词 Composite service Privacy information flow security Service evolution Petri net
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部