期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
安全协议系统安全属性定量计算方法
1
作者 李云辉 古天龙 《桂林电子科技大学学报》 2007年第6期487-490,共4页
定量分析安全协议系统是保证协议安全的必要环节。根据建立的安全协议系统的SMRP模型,给出了安全协议系统安全属性的计算方法,并从攻击者的角度讨论其累积报酬计算问题,通过NS协议(公钥协议)实例给出了分析过程,很好地解释了以NS协议为... 定量分析安全协议系统是保证协议安全的必要环节。根据建立的安全协议系统的SMRP模型,给出了安全协议系统安全属性的计算方法,并从攻击者的角度讨论其累积报酬计算问题,通过NS协议(公钥协议)实例给出了分析过程,很好地解释了以NS协议为基础的安全协议系统未产生重大损失的原因。结果表明,SMRP模型可以较好地定量分析安全协议系统。 展开更多
关键词 安全协议系统 定量计算 安全属性 SMRP
下载PDF
内网数据存储安全关键技术的研究与实现 被引量:5
2
作者 韩德志 《计算机研究与发展》 EI CSCD 北大核心 2011年第S1期181-188,共8页
针对内网海量数据存储安全问题,一方面,通过设计多协议安全文件系统MPSFS支持不同协议用户的访问,为不同用户提供统一的访问接口,实现用户高效和快速的数据存储和文件检索.另一方面,通过设计身份认证、访问控制和数据加密技术模块充分... 针对内网海量数据存储安全问题,一方面,通过设计多协议安全文件系统MPSFS支持不同协议用户的访问,为不同用户提供统一的访问接口,实现用户高效和快速的数据存储和文件检索.另一方面,通过设计身份认证、访问控制和数据加密技术模块充分保证内网存储系统中数据存储的安全性.实验结果显示,安全文件系统和安全模块能为内网海量数据存储提供好的安全性和扩展性,并对网络的I/O性能的影响较小. 展开更多
关键词 协议安全文件系统 身份认证 访问控制 数据加密
下载PDF
DNSSEC自动化部署相关问题分析 被引量:3
3
作者 郭川 冷峰 《网络与信息安全学报》 2017年第3期58-63,共6页
基于国家顶级域名系统安全扩展协议部署实践,总结了域名系统安全扩展协议发展背景,分析了域名系统安全扩展协议当前应用现状,提出并分析了域名系统安全扩展协议部署中的自动化问题,总结并分析了在生产环境中部署实施域名系统安全扩展协... 基于国家顶级域名系统安全扩展协议部署实践,总结了域名系统安全扩展协议发展背景,分析了域名系统安全扩展协议当前应用现状,提出并分析了域名系统安全扩展协议部署中的自动化问题,总结并分析了在生产环境中部署实施域名系统安全扩展协议时所需要注意的若干问题。 展开更多
关键词 域名系统 域名系统安全 域名系统安全扩展协议 自动化部署
下载PDF
内网安全文件系统的设计与实现
4
作者 朱建华 韩德志 《系统工程理论与实践》 EI CSSCI CSCD 北大核心 2011年第S2期135-139,共5页
针对内网海量数据存储安全问题,设计了多协议安全文件系统(MPSFS).一方面,MPSFS支持不同协议用户的访问,为不同用户提供统一的访问接口,实现用户高效和快速的访问;另一方面,MPSFS与身份认证和安全算法相结合充分保证内网存储系统中数据... 针对内网海量数据存储安全问题,设计了多协议安全文件系统(MPSFS).一方面,MPSFS支持不同协议用户的访问,为不同用户提供统一的访问接口,实现用户高效和快速的访问;另一方面,MPSFS与身份认证和安全算法相结合充分保证内网存储系统中数据的安全性.实验结果显示,MPSFS在保证信息存储安全性的同时,对内网I/O性能影响在实际中是可以接受的. 展开更多
关键词 协议安全文件系统 内网数据安全 身份谁认证 访问控制
原文传递
A Multi-homed VPN Architecture Based on Extended SOCKS+TLS Protocols
5
作者 张宝良 胡汉平 陈翔 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期250-255,共6页
A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmissio... A multi-homed VPN architecture based on extended SOCKSv5 and TLS was proposed. The architecture employs a dynamic connection mechanism for multiple proxies in the end system,i n which the security-demanded transmission connections can switch smoothly among the multiple proxies by maint aining a coherent connection context.The mechanism is transparent to application programs and can support th e building of VPN.With the cooperation of some other security components,the mechanism guarantees the reso urce availability and reliability of the end system against some attacks to the specific ports or hosts. 展开更多
关键词 multi-homed SOCKSv5 security connection context virtual private network (VPN)
下载PDF
E-commerce security policy analysis
6
作者 Maarina 《International Journal of Technology Management》 2014年第11期46-47,共2页
In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed... In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology. 展开更多
关键词 e-commerce security authentication system SSLX agreement SET protocol
下载PDF
Information Security Protocol Based System Identification with Binary-Valued Observations 被引量:2
7
作者 XU Changbao ZHAO Yanlong ZHANG Ji-Feng 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第4期946-963,共18页
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info... Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases. 展开更多
关键词 CRYPTOGRAPHY identification algorithm information security passive attacks security protocol time complexity
原文传递
Distributed anonymous data perturbation method for privacy-preserving data mining 被引量:4
8
作者 Feng LI Jin MA Jian-hua LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期952-963,共12页
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed s... Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment. 展开更多
关键词 Privacy-preserving data mining (PPDM) Distributed data mining Data perturbation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部