期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
ASP家族的新生代:安全应用服务提供商——诺方在线安全与信任服务一瞥
1
作者 彭涛 《科技潮》 2000年第7期129-129,共1页
随着企业向电子商务转移,单靠企业的 IT 部门已不能满足对系统管理和维护的繁重要求,于是,由第三方完成的新型服务——应用托管(Application Hosting)和应用服务提供商(ASP)应运而生。先是美国,接着是日本,逐渐势微的 Internet 接入服... 随着企业向电子商务转移,单靠企业的 IT 部门已不能满足对系统管理和维护的繁重要求,于是,由第三方完成的新型服务——应用托管(Application Hosting)和应用服务提供商(ASP)应运而生。先是美国,接着是日本,逐渐势微的 Internet 接入服务市场又现出了生机。1999年初,在国外的 IT 市场上,应用服务提供商和应用托管的逐渐成长预示着其发展的必然性。其实,ASP 最早出现于1998年,其创始者是Quest Communication 公司和 PSInet 等通信公司,他们通过在数据中心开设应用服务,从服务器进行分发 E-mail、会计处理等软件应用。1999年下半年,IBM 面向中小企业的实施“应用托管”。 展开更多
关键词 企业 应用软件 安全应用服务提供 ASP
下载PDF
CDSA安全体系架构研究 被引量:1
2
作者 于艳华 项巧莲 《中南民族大学学报(自然科学版)》 CAS 2006年第2期91-93,共3页
指出了安全体系架构问题是安全开发和安全应用所面临的最关键问题,In te l的安全体系架构(CDSA)就是一种典型的集中式安全体系架构设计.对In te l的安全体系架构CDSA的技术原理、安全功能作了介绍,重点分析了该安全体系的优势与不足等,... 指出了安全体系架构问题是安全开发和安全应用所面临的最关键问题,In te l的安全体系架构(CDSA)就是一种典型的集中式安全体系架构设计.对In te l的安全体系架构CDSA的技术原理、安全功能作了介绍,重点分析了该安全体系的优势与不足等,为开展由此安全体系开发设计出来的密码硬软件的分析解剖打下基础. 展开更多
关键词 公钥基础设施 安全体系架构 安全服务提供
下载PDF
安全中间件——SSPM管理模块的设计
3
作者 曾令华 佘堃 +1 位作者 欧阳开翠 周明天 《计算机应用》 CSCD 北大核心 2005年第11期2521-2523,2526,共4页
公共安全服务管理器(CSSM)是安全中间件核心模块。讨论了它的体系结构及其安全服务的运行流程。设计了对安全服务提供者模块(SSPM)的管理模块,给出了使用的数据结构及算法。
关键词 安全中间件 公共安全服务管理器 安全服务提供者模块
下载PDF
细说“窗口”的安全性
4
作者 殷建松 《中国经济和信息化》 1999年第Z1期31-31,共1页
从最早的Windows 3.1开始到Windows 95/98、Windows NT 3.51、Windows NT 4.0、Windows CE一直到即将推出的Windows 2000,Windows家族中几乎每个产品都引起了用户的关注。此文将就Windows家族的安全性进行阐述。
关键词 安全 WINDOWS WINDOWS “窗口” 安全服务提供者接口 NTLM 微软 电子证书 KERBEROS 加密文件系统
下载PDF
TSM技术研究及国内外TSM生态环境浅析 被引量:1
5
作者 李洁 牛天耘 易敏昕 《软件产业与工程》 2013年第6期25-29,共5页
随着基于硬件载体的移动支付技术的发展,如何使用户方便、快捷、安全的获取支付应用,已经成为移动支付业务规模化发展的前提条件,因此也受到国内外产业界的关注。可信服务管理(TSM)系统能够通过空中的方式向用户下载支付应用,解决了这... 随着基于硬件载体的移动支付技术的发展,如何使用户方便、快捷、安全的获取支付应用,已经成为移动支付业务规模化发展的前提条件,因此也受到国内外产业界的关注。可信服务管理(TSM)系统能够通过空中的方式向用户下载支付应用,解决了这一难题,也成为各移动支付业务主导方争相抢占的制高点。文章从TSM在移动支付生态环境中的地位、作用、服务内容、运营模式等四个方面给出了TSM的本质,并基于国外TSM试点应用的情况给出了我国TSM生态环境发展建议。 展开更多
关键词 可信服务管理移动支付 安全单元服务提供 载体发行方
下载PDF
Thinking in three's: Changing surgical patient safety practices in the complex modern operating room 被引量:9
6
作者 Verna C Gibbs 《World Journal of Gastroenterology》 SCIE CAS CSCD 2012年第46期6712-6719,共8页
The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to stu... The three surgical patient safety events, wrong site surgery, retained surgical items (RSI) and surgical fires are rare occurrences and thus their effects on the complex modern operating room (OR) are difficult to study. The likelihood of occurrence and the magnitude of risk for each of these surgical safety events are undefined. Many providers may never have a personal experience with one of these events and training and education on these topics are sparse. These circumstances lead to faulty thinking that a provider won't ever have an event or if one does occur the provider will intuitively know what to do. Surgeons are not preoccupied with failure and tend to usually consider good outcomes, which leads them to ignore or diminish the importance of implementing and following simple safety practices. These circumstances contribute to the persistent low level occurrence of these three events and to the difficulty in generating sufficient interest to resource solutions. Individual facilities rarely have the time or talent to understand these events and develop lasting solutions. More often than not, even the most well meaning internal review results in a new line to a policy and some rigorous enforcement mandate. This approach routinely fails and is another reason why these problems are so persistent. Vigilance actions alone havebeen unsuccessful so hospitals now have to take a systematic approach to implementing safer processes and providing the resources for surgeons and other stake-holders to optimize the OR environment. This article discusses standardized processes of care for mitigation of injury or outright prevention of wrong site surgery, RSI and surgical fires in an action-oriented framework illustrating the strategic elements important in each event and focusing on the responsibilities for each of the three major OR agents-anesthesiologists, surgeons and nurses. A Surgical Patient Safety Checklist is discussed that incorporates the necessary elements to bring these team members together and influence the emergence of a safer OR. 展开更多
关键词 Complex adaptive systems Wrong site surgery Retained surgical items Retained foreign objects Retained foreign bodies Surgical patient safety Surgical fires Safety checklist
下载PDF
Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks 被引量:2
7
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第3期104-117,共14页
Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we p... Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we propose a secure data sharing scheme in 0SNs based on ciphertext-policy attribute- based proxy re-encryption and secret sharing. In order to protect users' sensitive data, our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider. Our scheme presents a multiparty access control model, which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy. Further, we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider. We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext. Moreover, our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 展开更多
关键词 data sharing online socialnetworks multiparty access control attribute-based encryption attribute revocation
下载PDF
An Efficient Method for Checking the Integrity of Data in the Cloud 被引量:2
8
作者 TAN Shuang TAN Lin +1 位作者 LI Xiaoling JIA Yan 《China Communications》 SCIE CSCD 2014年第9期68-81,共14页
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch... Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure. 展开更多
关键词 cloud computing storage security public auditability provable data integrity
下载PDF
Towards Efficient and Secure Access Control System for Mobile Cloud Computing 被引量:5
9
作者 TU Shanshan HUANG Yongfeng 《China Communications》 SCIE CSCD 2015年第12期43-52,共10页
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ... This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud. 展开更多
关键词 cloud execution constraints partition encryption Encryption satisfying assume posed visualization
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部