期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
UMTS系统安全特性和安全机制分析 被引量:2
1
作者 祖海滢 蒋煜 《电信快报(网络与通信)》 2006年第2期34-35,39,共3页
文章根据3GPP提出的3G安全结构,介绍了UMTS安全总体结构,重点介绍和分析了UMTS网络接入安全特性和安全机制,并对未来发展趋势进行了展望。
关键词 通用移动通信系统(UMTS) 安全特性.安全机制 加密.解密.鉴权
下载PDF
浅析如何开好基层企业的安全三会
2
作者 王晋海 《中小企业管理与科技》 2012年第36期10-11,共2页
为了加强基层企业的安全管理,以火电厂安全三会作为安全的重要抓手,结合大唐太原第二热电厂近几年来的会议开展情况和经验,提出一些新的管理思路。以促进企业、部室、班组共同实现安全目标,达到管理的本质安全。
关键词 安全目标基础管理两票三制奖惩机制管理创新安全效益
下载PDF
浅谈水电新能源维护检修企业安全管理思考与实践
3
作者 高捍卫 赵发明 《中文科技期刊数据库(文摘版)工程技术》 2021年第1期242-242,244,共2页
加强安全管理与现场安全监督对水电新能源维护检修企业的安全生产、员工的生命安全和企业发展至关重要,本文对水电新能源维护检修企业特点以及现场安全监督工作现状进行了研究,分析了安全管理及现场安全监督上存在的问题,对安全管理体... 加强安全管理与现场安全监督对水电新能源维护检修企业的安全生产、员工的生命安全和企业发展至关重要,本文对水电新能源维护检修企业特点以及现场安全监督工作现状进行了研究,分析了安全管理及现场安全监督上存在的问题,对安全管理体制机制创新及强化现场安全监督工作进行了思考,并对智能化、数字化设备在安全管理及现场监督中的应用进行了探索,仅供同行参考。 展开更多
关键词 安全管理 现场安全监督 体制机制创新 智能化 数字化设备应用
下载PDF
落实安全管理机制
4
作者 赵立仁 《劳动保护》 2002年第6期33-34,共2页
关键词 天津铁路分局唐山机务段 铁路运输 安全安全机制 安全生产
原文传递
Security of Application System 被引量:1
5
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
Design of the XML Security System for Electronic Commerce Application 被引量:1
6
作者 安南 Zhang Shensheng 《High Technology Letters》 EI CAS 2003年第2期81-86,共6页
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu... The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application. 展开更多
关键词 electronic commerce security digital certificates smart card digital commerce AUTHENTICATION transaction integrity verification internet XML
下载PDF
Study on the efficacy of the safety incentive mechanisms 被引量:3
7
作者 田水承 李红霞 冯长根 《Journal of Coal Science & Engineering(China)》 2001年第1期70-74,共5页
Safety incentive mechanism and corresponding motivation avenues are helpful and important for the scientific safety management in coal mine. With the help of modern systematic analysis method, the efficacy of safety i... Safety incentive mechanism and corresponding motivation avenues are helpful and important for the scientific safety management in coal mine. With the help of modern systematic analysis method, the efficacy of safety incentive mechanisms is discussed in detail. The research shows that more effective avenue to reduce accident is to differently use motivation measures in practice. 展开更多
关键词 safety incentive mechanism systematic analysis EFFICACY
下载PDF
Research on Systematic Analysis and Countermeasures of the Buildings Construction Safety Problems 被引量:2
8
作者 Shen Liangfeng Li Jie Fan Yeming 《Engineering Sciences》 EI 2008年第1期59-65,共7页
The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects.... The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects. The authors summarize comprehensively the problems of buildings construetion safety in China at present based on grasping the whole safety status of buildings construction, and the synthetic countermeasures including the systems about laws, management, technology and education civilization for buildings construction safety management are brought up based on the viewpoint of safety system theory. Then it is thought that huilding scientific management mechanisms and popularizing effective management methods and measures are the fundamental ways for improving further the level of safety management for buildings construction in China at present. 展开更多
关键词 building construction safety management PROBLEM COUNTERMEASURES
下载PDF
LUCA:Lightweight Ubiquitous Computing Architecture
9
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2009年第3期300-308,共9页
Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbe... Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems. 展开更多
关键词 ubiquitous computing ARCHITECTURE TRUST AWARENESS privacy protection SECURITY
下载PDF
OvBNN authentication based on cooperative signature for wireless sensor networks 被引量:1
10
作者 秦丹阳 Zhang Yan +1 位作者 Ma Jingya Ji Ping 《High Technology Letters》 EI CAS 2018年第3期287-295,共9页
The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key man... The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time. 展开更多
关键词 optimized variant Bellare Namprempre Neven (OvBNN) digital signature authentication speed energy consumption wireless sensor networks (WSN)
下载PDF
Network Access Mechanisms and Security Issues under the Cloud Service Architecture
11
作者 Yonghua LIU 《International Journal of Technology Management》 2015年第6期98-100,共3页
Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number ... Currently, under the cloud service architecture, the increasing importance of network security and security issues are still emerging. With the rapid development of the network platform, it is connected to the number and size of the trusted computing environment for all kinds of applications that are rapidly expanding, ever-changing network health, network time being emergencies, assault, failure, threat of disaster, its safety, survivability and availability of face serious challenges. Although TNC Working Group made safe and reliable framework from the network access layer, it is not at the level of user access, system access levels and further given the level of situational awareness and effective solutions. 展开更多
关键词 Cloud Services Access Mechanism SECURITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部