期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
医院信息数据安全系统建设的体会
1
作者 张丽玉 《福建医药杂志》 CAS 2002年第3期107-107,共1页
关键词 医院管理 自动化管理 数据备份 医院信息数据安全系统
下载PDF
数据库审计系统在医院管理中的应用 被引量:4
2
作者 王俊新 尚明伟 臧达菲 《中华医学图书情报杂志》 CAS 2019年第3期76-80,共5页
对医院信息系统数据的安全进行分析的基础上,提出了将数据库审计系统应用于医院管理的必要性。数据库审计系统的应用,可有效解决医院信息系统数据的安全,控制了医院信息系统中敏感事件的发生。
关键词 数据库审计系统 医院管理 信息系统数据安全
下载PDF
党政机关互联网站代码安全存在问题及对策
3
作者 王宏 《经贸实践》 2015年第12X期320-321,共2页
近年来,随着信息技术的高速发展、迅速普及且各级政务部门要加快政务信息公开的步伐,上至国家机关下到乡镇村庄都逐步建立了互联网门户网站,网站如同雨后春笋般在互联网上涌现。如果不对这类网站进行有效的保护,会使其受到诸如黑客、病... 近年来,随着信息技术的高速发展、迅速普及且各级政务部门要加快政务信息公开的步伐,上至国家机关下到乡镇村庄都逐步建立了互联网门户网站,网站如同雨后春笋般在互联网上涌现。如果不对这类网站进行有效的保护,会使其受到诸如黑客、病毒、一些社会满意度较低民众的有意破坏与攻击,其危害较大,严重威胁着网站的运行安全。同时网站还将受到网络安全漏洞的影响。但是,通常一些安全防护技术可以轻松的防范这些安全漏洞。那如何防护呢?本文就各单位门户网站中经常出现的安全技术及代码设计中容易出现的问题进行分析,并提出解决对策。 展开更多
关键词 数据库代码程序代码信息系统安全防护
下载PDF
A reference model for database security proxy 被引量:1
4
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
下载PDF
Robust digital image watermarking against shearing based on Haar orthogonal function system 被引量:1
5
作者 DENGMing-hui HAOYan-ling SHENDong-hui 《Journal of Marine Science and Application》 2004年第1期75-80,共6页
In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogon... In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogonal function system to achieve the piece-based orthogonal transform on the image. The significant middle frequency coefficients in the transformation matrix are picked up, based on characteristics of the image visual system and the Haar orthogonal transform. The watermark is adoptively weighed to the middle frequency matrix. The method improves the validity of watermarking and shows excellent advantage against shearing attack. Experimental results show that the Haar orthogonal function system based watermark approach can provide an excellent protection under geometric attacks. 展开更多
关键词 digital watermarking Haar orthogonal function system shearing attack
下载PDF
Restricted common data in anonymous E-cash system 被引量:1
6
作者 张向军 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期595-600,共6页
Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficien... Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems. 展开更多
关键词 blind signatures anonymity E-cash system restricted common data
下载PDF
论中国网络空间犯罪立法的本土化与国际化 被引量:37
7
作者 皮勇 《比较法研究》 CSSCI 北大核心 2020年第1期135-154,共20页
网络空间犯罪是计算机犯罪、网络犯罪在网络平台时代的新相态,为了有效打击网络空间犯罪,中国刑法既要坚持本土化发展,也要借鉴国外立法的成功经验,积极推动国际社会相关立法协调一致。计算机数据和信息系统安全是独立的公共法益,应当... 网络空间犯罪是计算机犯罪、网络犯罪在网络平台时代的新相态,为了有效打击网络空间犯罪,中国刑法既要坚持本土化发展,也要借鉴国外立法的成功经验,积极推动国际社会相关立法协调一致。计算机数据和信息系统安全是独立的公共法益,应当给予全面的刑法保护。惩治网络化的传统犯罪应当坚持科学防控和法治原则,避免以刑代管,更不应突破法律规定解释立法。妨害信息网络安全管理秩序犯罪是独立的、具有"积量构罪"特征的正当立法,司法适用中应坚持独立适用和实质正当原则,合理缩限解释构成要件要素,对情节要件进行必要的类型化。充分保护个人信息符合中国国家利益、公共利益和公众利益,应在平衡个人信息法律保护和合法利用的基础上,为公民个人信息提供更全面的法律保护。 展开更多
关键词 网络空间犯罪 计算机数据信息系统安全 传统犯罪网络化 妨害信息网络安全管理秩序犯罪 个人信息
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部