期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
兵器企业商密网规划思考
1
作者 胡艳岭 沙金龙 姜鹏程 《兵工自动化》 2020年第8期32-36,共5页
针对兵器行业战略转型发展需要,结合兵器企业基础网络现状及特点,系统分析企业在科研生产、销售经营和公共管理等方面的商密网建设需求。综合考虑发展趋势与需求导向,围绕业务剥离、系统定级、架构设计,提出规划建设要点及实施策略,可... 针对兵器行业战略转型发展需要,结合兵器企业基础网络现状及特点,系统分析企业在科研生产、销售经营和公共管理等方面的商密网建设需求。综合考虑发展趋势与需求导向,围绕业务剥离、系统定级、架构设计,提出规划建设要点及实施策略,可为兵器企业以及同类型军工企业信息化规划提供指导。 展开更多
关键词 商密网 规划 等级保护
下载PDF
基于虚拟化技术的商密网隔离系统在电力企业的应用——以中国水电建设集团崇信发电有限责任公司为例
2
作者 拜刚 白嘉菀 《西北电建》 2014年第1期7-11,共5页
为了保证企业的信息安全以及符合相关信息化安全标准,需要将处理企业办公业务的涉密计算机网络与互联网隔离,即内外网隔离,或者称为商密网与互联网的隔离。北京一同宇科技发展有限公司基于虚拟化技术研制的同宇商密网隔离系统,在一... 为了保证企业的信息安全以及符合相关信息化安全标准,需要将处理企业办公业务的涉密计算机网络与互联网隔离,即内外网隔离,或者称为商密网与互联网的隔离。北京一同宇科技发展有限公司基于虚拟化技术研制的同宇商密网隔离系统,在一个物理网络上通过虚拟化的方式,虚拟出两套甚至多套相互隔离、相互独立的网络。该商密网隔离系统已经部署崇信发电公司,隔离效果良好,达到了商密信息与互联网隔离要求。 展开更多
关键词 虚拟化技术 商密网隔离系统 北京一同宇
原文传递
Security analysis of newly ameliorated WAPI protocol 被引量:3
3
作者 庞辽军 李慧贤 王育民 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期25-28,共4页
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ... Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security. 展开更多
关键词 wireless local area network (WLAN) WLAN authentication and privacy infrastructure (WAPI) AUTHENTICATION key negotiation CK model
下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
4
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部