期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
数据库安全技术策略与多级安全代理模型 被引量:7
1
作者 宋红君 秦利波 《华北科技学院学报》 2005年第2期93-96,共4页
分析了当前数据库安全技术对操作系统、密码验证身份认证的完全依赖性和加密解密的时间代价的三种不足,从系统、数据、用户、数据库管理者、应用程序开发者的安全性进行论证,提出了解决安全威胁的策略,从而建立了数据库安全模型——多... 分析了当前数据库安全技术对操作系统、密码验证身份认证的完全依赖性和加密解密的时间代价的三种不足,从系统、数据、用户、数据库管理者、应用程序开发者的安全性进行论证,提出了解决安全威胁的策略,从而建立了数据库安全模型——多级安全代理模型。 展开更多
关键词 数据库 角色 安全技术策略 多级安全代理模型
下载PDF
基于MASS和JavaCard的移动代理安全模型
2
作者 王畅 向明森 刘美连 《计算机工程》 CAS CSCD 北大核心 2007年第10期169-171,共3页
探讨了移动代理防范恶意主机的攻击问题,提出了一个基于移动代理安全服务器和JavaCard的安全模型。模型中的通信信息进行了签名和加密,可以防止恶意主机窥视和篡改代理的代码和数据,也能防止恶意主机伪造移动代理。安全机制中能进行异... 探讨了移动代理防范恶意主机的攻击问题,提出了一个基于移动代理安全服务器和JavaCard的安全模型。模型中的通信信息进行了签名和加密,可以防止恶意主机窥视和篡改代理的代码和数据,也能防止恶意主机伪造移动代理。安全机制中能进行异常情况处理,较好地了解决恶意对移动代理的攻击问题。模型中JC证书的管理和更新问题需进一步研究。 展开更多
关键词 移动代理安全服务器 JC 移动代理安全模型
下载PDF
安全代理模型的研究和实现 被引量:1
3
作者 田爱军 张勇进 张知恒 《信息安全与通信保密》 2001年第8期34-36,共3页
随着因特网在全球的迅猛发展,它对人们的生活产生越来越大的影响.特别是网上商业贸易浪潮的兴起,使得网络安全成为网上业务稳步发展所面临的首要问题.
关键词 安全代理模型 计算机网络 网络安全
原文传递
A reference model for database security proxy 被引量:1
4
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
下载PDF
Contrastive analysis and crashworthiness optimization of two composite thin-walled structures 被引量:4
5
作者 谢素超 周辉 +1 位作者 梁习锋 任鑫 《Journal of Central South University》 SCIE EI CAS 2014年第11期4386-4394,共9页
For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can b... For the safety protection of passengers when train crashes occur, special structures are crucially needed as a kind of indispensable energy absorbing device. With the help of the structures, crash kinetic-energy can be completely absorbed or dissipated for the aim of safety. Two composite structures(circumscribed circle structure and inscribed circle structure) were constructed. In addition, comparison and optimization of the crashworthy characteristic of the two structures were carried out based on the method of explicit finite element analysis(FEA) and Kriging surrogate model. According to the result of Kriging surrogate model, conclusions can be safely drawn that the specific energy absorption(SEA) and ratio of specific energy absorption to initial peak force(REAF) of circumscribed circle structure are lager than those of inscribed circle structure under the same design parameters. In other words, circumscribed circle structure has better performances with higher energy-absorbing ability and lower initial peak force. Besides, error analysis was adopted and the result of which indicates that the Kriging surrogate model has high nonlinear fitting precision. What is more, the SEA and REAF optimum values of the two structures have been obtained through analysis, and the crushing results have been illustrated when the two structures reach optimum SEA and REAF. 展开更多
关键词 contrastive analysis crashworthiness optimization composite structure Kriging surrogate model finite element analysis
下载PDF
THRESHOLD PROXY RE-SIGNATURE 被引量:7
6
作者 Piyi YANG Zhenfu CAO Xiaolei DONG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第4期816-824,共9页
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to... The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach. 展开更多
关键词 Proxy re-signature ROBUST THRESHOLD unforgeable.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部