期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于拟熵的信息安全度模糊综合评估及实证研究 被引量:2
1
作者 庞海珍 马晓英 《图书情报工作》 CSSCI 北大核心 2010年第20期53-56,27,共5页
针对信息安全评估的繁复性和评价信息的模糊性,引入拟熵权模糊综合评估法,克服熵权法计算量较大和算法有时不可行的缺陷,为此类问题的求解提供一个新的思路和方法。为便于应用,给出算法流程图。最后结合实例,将拟熵权与熵权、Delphi法... 针对信息安全评估的繁复性和评价信息的模糊性,引入拟熵权模糊综合评估法,克服熵权法计算量较大和算法有时不可行的缺陷,为此类问题的求解提供一个新的思路和方法。为便于应用,给出算法流程图。最后结合实例,将拟熵权与熵权、Delphi法赋权的模糊综合评估结果进行比较,表明拟熵权法的隶属度最高。通过编制Matlab程序实现信息安全评估的半自动化,以减轻繁复的评估工作。 展开更多
关键词 信息安全度 糊综合评估 拟熵 MATLAB程序 算法流程图
原文传递
基于信息安全度的域间角色权限映射机制
2
作者 张博文 《网络安全技术与应用》 2015年第6期99-100,共2页
域间访问控制能保障域间信息资源安全访问,防止非法的主体进入受保护的网络资源,域间角色映射是实现访问控制的关键技术之一。传统基于角色的域间映射机制,计算比较复杂、通信量和计算量较大,不适用于多域间访问控制机制。本文提出基于... 域间访问控制能保障域间信息资源安全访问,防止非法的主体进入受保护的网络资源,域间角色映射是实现访问控制的关键技术之一。传统基于角色的域间映射机制,计算比较复杂、通信量和计算量较大,不适用于多域间访问控制机制。本文提出基于信息安全度的域间角色权值映射算法,将不同域及域内资源的机密程度划分不同的安全级别,根据不同资源的安全度值建立资源实体拓扑图,采用图的遍历算法进行域间角色权值映射路径查找计算,根据角色映射的资源存在性,达到访问控制的目的。经模拟计算该算法具有较高的性能,适用于多域环境下的访问控制。 展开更多
关键词 访问控制 信息安全度 多域 角色映射
原文传递
主动网络对分布式应用性能的提高
3
作者 向旭宇 秦姣华 《益阳师专学报》 2001年第3期53-56,共4页
随着计算机技术的发展和网络的推广 ,分布式应用成为发展的趋势 .针对主动协议对分布式应用性能的提高进行探讨 ,从而提出对cache等主动协议的要求 。
关键词 分布式应用 主动网络 Cache协议 主动协议 网络结构 服务能力 信息安全度
下载PDF
MP-WFRFT and Constellation Scrambling Based Physical Layer Security System 被引量:29
4
作者 FANG Xiaojie SHA Xuejun LI Yue 《China Communications》 SCIE CSCD 2016年第2期138-145,共8页
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two... In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers. 展开更多
关键词 weighted fractional Fourier transform(WFRFT) physical layer (PHY) security secrecycapacity
下载PDF
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
5
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部