期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
浅谈新一代非编网系统的运行管理 被引量:3
1
作者 徐俭 《有线电视技术》 2008年第4期73-76,共4页
本文从新一代非编网系统的用户及其权限管理、设备配置与管理、素材及其存储空间管理、业务流程管理、日志与统计管理、网络系统安全管理等方面,就扬州电视台新一代非编网系统运行管理问题进行一些论述。
关键词 新一代非编网系统 权限管理 素材管理 存储空间管理 业务流程管理 网络系统安全管理
下载PDF
石油企业信息安全典型设计
2
《数字化工》 2004年第1期36-37,共2页
在进行信息安全系统建设中,各行业应考虑本业务的独特性,将网络基础建设及信息安全系统建没同步规划,并将安全服务及管理作为安全体系的重要部分加以重点考虑,这样才能真正实现信息安全。本文作者从石油企业的信息安全特点入于,介绍了... 在进行信息安全系统建设中,各行业应考虑本业务的独特性,将网络基础建设及信息安全系统建没同步规划,并将安全服务及管理作为安全体系的重要部分加以重点考虑,这样才能真正实现信息安全。本文作者从石油企业的信息安全特点入于,介绍了整体规划信息安全系统的思路,将对其他行业的信息安全规划有所帮助。 展开更多
关键词 石油企业 信息安全 访问控制系统 信息安全传输 网络攻击检测 网络安全集中管理 网络系统安全管理
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
3
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
Design and Implementation of Security Solution for Computer Network
4
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 Network security FIREWALL Intrusion detection Security audit
下载PDF
A Design of the Network Security Evaluation System
5
作者 Ziyan Shi Guolin Zhao Qiaolin Hu 《International Journal of Technology Management》 2014年第9期103-105,共3页
The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluat... The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security 展开更多
关键词 Security Evaluation Security Rules Evaluation Algorithm
下载PDF
Research about Online Security Warning and Risk Assessment of Power Grid Based on Energy Management System
6
作者 Hanyun Wang Kangyuan Wang +2 位作者 Yunxiao Zhang Guoqiang Mei Mingming Wu 《Journal of Energy and Power Engineering》 2012年第3期485-487,共3页
In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and ... In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and external operating environment. It combines the two factors, contingency likelihood and severity, that determine system reliability, into risk indices on different loads and operation modes, which provide precise evaluation of the power grid's security performance. According to these indices, it can know the vulnerable area of the system and whether the normal operating mode or repair mode is over-limited or not, and provide decision-making support for dispatchers. Common cause outages and equipment-aging are considered in terms of the establishment of outage model. Multiple risk indices are defined in order to reflect the risk level of the power grid more comprehensively. 展开更多
关键词 EMS (energy management system) online security warning risk assessment.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部