期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
NASA安全性体系框架研究
1
作者 刘春雷 周海京 +2 位作者 高树成 杨静 沈岭 《质量与可靠性》 2023年第4期25-32,共8页
美国航空航天局(NASA)发布了新版的安全性工作通用要求和技术手册,建立了新的安全性体系框架,进一步明确了订购方和承制方的安全性工作职责,细化了安全性目标和要求论证的指导原则和方法,对安全性分析方法进行了整合,明确了安全性工作... 美国航空航天局(NASA)发布了新版的安全性工作通用要求和技术手册,建立了新的安全性体系框架,进一步明确了订购方和承制方的安全性工作职责,细化了安全性目标和要求论证的指导原则和方法,对安全性分析方法进行了整合,明确了安全性工作对要求论证、项目管理、产品设计等研制工作的支持关系,并对安全性验证方法进行了重大调整,要求承制方采用系统化、结构化的安全性验证方法对各类安全性要求实现情况进行综合验证,同时还重新规划了型号寿命周期内各阶段的安全性工作程序。新安全性体系框架的建立和实施,为保证NASA航天产品的安全性发挥了重要作用,值得国内航天行业参考和借鉴,据此对航天行业安全性技术体系进行完善。 展开更多
关键词 NASA 安全性体系框架 安全性原则 安全性要求 安全性验证
下载PDF
基于软件工程思想的软件安全性保障框架研究
2
作者 张亚林 耿祥义 《电脑知识与技术》 2009年第11期8731-8732,共2页
通过分析软件安全领域存在的问题。以软件工程思想为基础,运用系统安全工程的原则,提出一个软件安全性保障框架。在软件开发生命周期过程中,将软件安全保障集成到需求分析,设计编码,测试,维护四个环节中,详细阐述了每个环节要进... 通过分析软件安全领域存在的问题。以软件工程思想为基础,运用系统安全工程的原则,提出一个软件安全性保障框架。在软件开发生命周期过程中,将软件安全保障集成到需求分析,设计编码,测试,维护四个环节中,详细阐述了每个环节要进行的安全性处理的任务,采用一系列安全预测和分析技术,确保软件开发的安全性和可靠性。 展开更多
关键词 软件工程 系统安全工程 软件安全性保障框架
下载PDF
行动者、村庄与国家:城中村改造中农民行动的情景框架 被引量:5
3
作者 戴建生 《学术研究》 CSSCI 北大核心 2013年第4期45-49,共5页
在广州市珠江村城中村改造中,农民的行为选择受到不同行动框架的约束,该约束成为大致相同社会情境下农民行动逻辑的重要影响因素。运用国家(地方政府)提供的市场交易性框架,当国家和市场不能提供足够高的保障水平时,农民又会转而回归村... 在广州市珠江村城中村改造中,农民的行为选择受到不同行动框架的约束,该约束成为大致相同社会情境下农民行动逻辑的重要影响因素。运用国家(地方政府)提供的市场交易性框架,当国家和市场不能提供足够高的保障水平时,农民又会转而回归村庄集体,寻找安全性框架。不同的社会情境触发不同的行动框架。道义论和理性论都过于绝对。 展开更多
关键词 城中村改造 行为选择 交易性框架 安全性框架
下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
4
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
下载PDF
Safety and Efficacy of Frameless Stereotactic Brain Biopsy Techniques 被引量:3
5
作者 Qiu-jian Zhang Wen-hao Wang +1 位作者 Xiang-pin Wei Yi-gang Yu 《Chinese Medical Sciences Journal》 CAS CSCD 2013年第2期113-116,共4页
Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frame... Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frameless stereotactic brain biopsy between January 2008 and December 2010 in Xiamen University Southeast Hospital.Preoperative characteristics and histological diagnosis were reviewed and then information was analysed to identify factors associated with the biopsy not yielding a diagnosis and complications.Results Diagnostic yield was 93.5%.No differences were found between pathological diagnosis and frozen pathological diagnosis.The most common lesions were astrocytic lesions,included 16 cases of low-grade glioma and 12 cases of malignant glioma.Remote hemorrhage,metastasis,and lymphoma were following in incidence.Multiple brain lesions were found in 17 cases (27.4%).Eleven cases were frontal lesions (17.7%),8 were frontotemporal (12.9%),6 were frontoparietal (9.7%),and 5 each were temporal,parietal,and parietotemporal lesions (8.1%).Postoperative complications occurred in 21.0% of the patients after biopsies,including 10 haemorrhages (16.1%) and 3 temporary neurological deficits (1 epilepsy,1 headache,and 1 partial hemiparesis).No patient required operation for hematoma evacuation.Conclusion Frameless stereotactic biopsy is an effective and safe technique for histologic diagnosis of brain lesions,particularly for multifocal and frontal lesions. 展开更多
关键词 STEREOTAXIS FRAMELESS BIOPSY HISTOLOGY
下载PDF
Randomized Stream Ciphers with Enhanced Security Based on Nonlinear Random Coding
6
作者 Anton Alekseychulk Sergey Gryshakov 《Journal of Mathematics and System Science》 2015年第12期516-522,共7页
We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We inves... We propose a framework for designing randomized stream ciphers with enhanced security. The key attribute of this framework is using of nonlinear bijective mappings or keyless hash functions for random coding. We investigate the computational security of the proposed ciphers against chosen-plaintext-chosen-initialization-vector attacks and show that it is based on the hardness of solving some systems of random nonlinear Boolean equations. We also provide guidelines for choosing components to design randomizers for specified ciphers. 展开更多
关键词 Symmetric cryptography randomized stream cipher random coding computational security chosen-plaintext-chosen-initialization-vector attack.
下载PDF
Digital Signatures for e-Government - a Long-Term Security Architecture 被引量:1
7
作者 Przemyslaw Blaskiewicz Przemyslaw Kubiak Miroslaw Kutylowski 《China Communications》 SCIE CSCD 2010年第6期64-70,共7页
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante... The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side. 展开更多
关键词 MRSA PSS padding hash based signatures kleptography deterministic signatures
下载PDF
A Knowledge Management Framework of the Information Technology-Based Approach for Improving Occupational Safety Training of Young Workers
8
作者 Irena Hejduk Waldemar Karwowski 《Chinese Business Review》 2016年第1期42-47,共6页
This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of ... This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland. 展开更多
关键词 knowledge management occupational safety education and training young workers
下载PDF
A Universal Composability Framework for Analysis of Proxy Threshold Signature
9
作者 洪璇 李详学 +1 位作者 龚征 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期107-111,共5页
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol compositio... The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme. 展开更多
关键词 proxy threshold signature universal composability RSA cryptosystem mobile agents
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部