期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
计算机软件安全检测存在的问题及方法分析 被引量:1
1
作者 朱晓艳 吴云 《软件》 2023年第1期150-152,共3页
计算机软件是指在计算机整个系统当中具有固定的存在的形式,是设定计算机的核心存在。程序是计算机运作和计算机技术运用的主要性的描述,关键性作用在于计算机中的正确处理目标和解决标准。文本文档则可以有利于计算机用户掌握计算机系... 计算机软件是指在计算机整个系统当中具有固定的存在的形式,是设定计算机的核心存在。程序是计算机运作和计算机技术运用的主要性的描述,关键性作用在于计算机中的正确处理目标和解决标准。文本文档则可以有利于计算机用户掌握计算机系统的辅助材料。在本文的探讨里将对于计算机技术检测中存在的不足和局限性开展具体分析,论述可以提高计算机检测精确性的方法,为相关领域的检验工作提供一定的理论依据。 展开更多
关键词 计算机软件安全检测 问题 方法
下载PDF
网络环境下个人计算机安全防护浅析 被引量:2
2
作者 杨晓萍 《电脑学习》 2004年第3期12-13,共2页
介绍计算机安全检测方法和个人计算机常用安全防护措施。
关键词 计算机安全检测 安全防护措施 网络环境 病毒诊断 黑客 网络安全
下载PDF
计算机软件安全检测技术研究 被引量:8
3
作者 王爽 《信息与电脑(理论版)》 2011年第11期52-52,54,共2页
随着互联网的应用日益普及,同时随着我国网络市场的逐渐强大,越来越多的个人或企业将商务活动投入电子商务平台,所以计算机软件中安全检测技术的研究,对于防范软件应用潜在的安全漏洞风险有着十分重要的意义。本文也将就此系统地探讨有... 随着互联网的应用日益普及,同时随着我国网络市场的逐渐强大,越来越多的个人或企业将商务活动投入电子商务平台,所以计算机软件中安全检测技术的研究,对于防范软件应用潜在的安全漏洞风险有着十分重要的意义。本文也将就此系统地探讨有关计算机软件安全的主要检测技术。 展开更多
关键词 计算机软件 安全检测技术 安全漏洞
原文传递
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
4
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
MULTI-AGENT SYSTEM FOR WORM DETECTION AND CONTAINMENT IN METROPOLITAN AREA NETWORKS
5
作者 Gou Xiantai Jin Weidong Zhao Duo 《Journal of Electronics(China)》 2006年第2期259-265,共7页
Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated th... Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated them self to a first-class security threat to Metropolitan Area Networks (MAN). Multi-agent system for Worm Detection and Containment in MAN (MWDCM) is presented to provide a first-class automatic reaction mechanism that automatically applies containment strategies to block the propagation of the worms and to protect MAN against worm scan that wastes a lot of network bandwidth and crashes the routers. Its user agent is used to detect the known worms. Worm detection agent and worm detection correlation agent use two-stage based decision method to detect unknown worms. They adaptively study the accessing in the whole network and dynamically change the working parameters to detect the unknown worms. MWDCM confines worm infection within a macro-cell or a micro-cell of the metropolitan area networks, the rest of the accesses and hosts continue functioning without disruption. MWDCM integrates Worm Detection System (WDS) and network management system. Reaction measures can be taken by using Simple Network Management Protocol (SNMP) interface to control broadband access server as soon as the WDS detect the active worm. MWDCM is very effective in blocking random scanning worms. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MWDCM blocking the propagation of the worms. 展开更多
关键词 Multi-agent system Worm detection Worm containment Metropolitan area networks
下载PDF
Personalized Trust Management for Open and Flat P2P Communities
6
作者 左敏 李建华 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期527-532,共6页
A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trus... A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload. 展开更多
关键词 P2P trust management DHT collaborative filtering
下载PDF
在线MFSS系统的设计与实现
7
作者 周洁文 《石油化工自动化》 CAS 2002年第2期16-18,共3页
介绍了一种新型的设备故障安全检测的计算机自动巡检系统 ,该系统具有安装简单、操作简便、检测速度快、设备故障自动报警、投资费用低等特点 ,可以在线检测到设备劣化初始时数据的变化。及时处理或计划检修 。
关键词 在线MFSS系统 系统设计 系统应用 计算机在线自动设备故障安全检测系统
下载PDF
A virtual machine-based invasion detection system for the virtual computing environment
8
作者 曾宇 Wang Jie +2 位作者 Sun Ninghui Li Jun Nie Hua 《High Technology Letters》 EI CAS 2006年第4期379-384,共6页
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra... Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain. 展开更多
关键词 virtual computing environment oriented virtual machine-based invasion detection system (VIDS) capacity services computing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部