期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
“软安全”管理:企业发展的生命线——基于社会责任与“潜规则”博弈的视角 被引量:1
1
作者 易开刚 《经济经纬》 CSSCI 北大核心 2009年第2期79-82,共4页
目前,以产品质量、商誉、信任、伦理和文化为核心要素的"软安全"管理已经成为关乎企业发展的生命线。笔者在分析"潜规则"、社会责任、企业"软安全"的内涵以及三者之间逻辑关系的基础上,构建了基于"... 目前,以产品质量、商誉、信任、伦理和文化为核心要素的"软安全"管理已经成为关乎企业发展的生命线。笔者在分析"潜规则"、社会责任、企业"软安全"的内涵以及三者之间逻辑关系的基础上,构建了基于"潜规则"与社会责任价值博弈的企业"软安全"管理模型,提出社会责任与"潜规则"价值博弈时的四项检验,并提出了加强企业"软安全"管理的几点建议。 展开更多
关键词 软安全”管理 生命线 “潜规则” 企业社会责任 价值博弈
下载PDF
中小型企业网络软安全防护体系的研究与设计 被引量:1
2
作者 莫乐群 《现代计算机》 2010年第6期138-141,共4页
一般来说,中小型企业内部网的拓扑结构都不复杂,主机数量有限,服务器提供的服务相对较少,同时因为人力和资金上的局限,中小型企业通常很少购买专门的网络安全防护设备,甚至没有专门的管理员来维护网络的安全,这就给黑客和非法访问提供... 一般来说,中小型企业内部网的拓扑结构都不复杂,主机数量有限,服务器提供的服务相对较少,同时因为人力和资金上的局限,中小型企业通常很少购买专门的网络安全防护设备,甚至没有专门的管理员来维护网络的安全,这就给黑客和非法访问提供了可乘之机。针对这种情况,提出一种软安全防护体系,使得中小型企业能够获得全面、低成本以及集成化的网络安全保护。 展开更多
关键词 网络 软安全 IDS
下载PDF
企业软安全论析 被引量:1
3
作者 陈健庚 《河南科技》 2013年第3期216-217,共2页
本文将企业生产中的安全,分为硬安全与软安全,在具体分析软安全可靠度后进行了应用模式的实证研究。
关键词 安全 软安全 事故概率 可靠度 应用模式
下载PDF
金融系统软安全与策略思考
4
作者 林飞 《电脑技术信息》 1998年第8期50-51,共2页
关键词 金融系统 软安全 计算机病毒 中国
下载PDF
论全程干预式档案馆“软安全”建设
5
作者 王蒙 《档案管理》 北大核心 2022年第3期77-78,共2页
档案馆安全,依是否有人工干预,分为“软安全”和“硬安全”。通过对“软安全”和“硬安全”可靠度特性分析。发现在“硬安全”环境相对稳定的情况下,“软安全”是影响档案馆安全的最大变量与风险,是档案馆安全工作的重中之重。南阳市城... 档案馆安全,依是否有人工干预,分为“软安全”和“硬安全”。通过对“软安全”和“硬安全”可靠度特性分析。发现在“硬安全”环境相对稳定的情况下,“软安全”是影响档案馆安全的最大变量与风险,是档案馆安全工作的重中之重。南阳市城乡规划建设档案馆在贯彻“三位一体”安全工作原则时,加强了对以“人防”为核心的“软安全”的全程干预,收效良好。 展开更多
关键词 档案馆 档案安全 软安全 安全 人工干预 安全管理
下载PDF
基于安全软实力的煤矿行为安全研究 被引量:4
6
作者 代伟 谢雄刚 +1 位作者 白雯 郭鹏飞 《技术与创新管理》 2018年第2期157-162,共6页
为探析影响煤矿行为安全的因素,从煤矿企业文化建设角度出发,提出安全软实力的概念并阐述其内容,结合员工个人层面,确定4个二级指标以及20个一级指标,构建煤矿行为安全模型,较好地涵盖了煤矿安全的各方面工作。将该模型运用于某煤矿,采... 为探析影响煤矿行为安全的因素,从煤矿企业文化建设角度出发,提出安全软实力的概念并阐述其内容,结合员工个人层面,确定4个二级指标以及20个一级指标,构建煤矿行为安全模型,较好地涵盖了煤矿安全的各方面工作。将该模型运用于某煤矿,采用序关系分析法得到各级指标的权重,运用集对分析法进行定量分析,实现定性与定量相结合,得到该煤矿行为安全联系度的表达式,对联系度的同一度、差异度和对立度进行了分析,该煤矿行为安全情况较好,但仍需要根据指标,针对不足之处开展改善工作。所得结果表明,基于安全软实力的煤矿行为安全模型能够很好地反映煤矿行为安全情况,并为安全工作的开展提供指导。 展开更多
关键词 安全实力 煤矿行为安全模型 集对分析 安全联系度 行为安全
下载PDF
沉降与侧向位移动态监控软土地基安全 被引量:2
7
作者 袁国清 刘红军 杨艳秋 《自然灾害学报》 CSCD 北大核心 2009年第3期123-128,共6页
软土地基施工期的安全稳定性控制标准常采用规范法,但单一利用规范法判断软土地基在施工期的安全性缺乏理论依据,因为软土地基的安全性受软土本身性质、软土层厚度和施工加载过程等多种因素的影响。为此在某个实际工程中,埋设了现场监... 软土地基施工期的安全稳定性控制标准常采用规范法,但单一利用规范法判断软土地基在施工期的安全性缺乏理论依据,因为软土地基的安全性受软土本身性质、软土层厚度和施工加载过程等多种因素的影响。为此在某个实际工程中,埋设了现场监测设备,利用现场沉降与侧向位移监测数据,采用规范法和拐点法详细地分析了经过处理后的湿地软土地基在路堤填土分级加载过程中的稳定性。通过两种方法的对比分析得出了一致的结论,即湿地软土地基在路堤填土分级加载过程中是稳定的,与工程实际相符,为今后类似工程采用规范法控制软土地基安全提供了依据。 展开更多
关键词 沉降与侧向位移 动态监控 土地基安全 规范法 拐点法
下载PDF
QJR1-300/1140矿用隔爆兼本质安全型交流软启动器
8
《煤矿现代化》 1999年第3期50-50,共1页
关键词 矿用隔爆兼本质安全型交流启动器 起动电流 起动速度 电流平衡方式 自动控制 运输机械
下载PDF
欧洲安全战略与国家的优先选择 被引量:2
9
作者 巩乐(译) 《南开学报(哲学社会科学版)》 CSSCI 北大核心 2008年第1期10-20,共11页
从安全威胁的感知、威胁应对方式、资源分配和公众舆论等四个方面对比分析欧洲安全战略视角和欧盟四个主要成员国(法国、德国、意大利、英国)视角的异同可以看出,虽然欧洲安全战略尚未形成一种明显的认同或独立性,而且各欧盟成员国之间... 从安全威胁的感知、威胁应对方式、资源分配和公众舆论等四个方面对比分析欧洲安全战略视角和欧盟四个主要成员国(法国、德国、意大利、英国)视角的异同可以看出,虽然欧洲安全战略尚未形成一种明显的认同或独立性,而且各欧盟成员国之间还存在重要的分歧,但是它却为共同的安全战略或安全文化的形成奠定了坚实的基础。 展开更多
关键词 欧洲安全战略 威胁感知 安全 软安全 安全文化
下载PDF
基于操作系统安全的应用层安全研究
10
作者 郑志蓉 沈昌祥 《计算机应用研究》 CSCD 北大核心 2002年第5期43-45,共3页
首先分析了目前信息系统中关于应用层安全解决方案中普遍存在的一些问题。强 调了操作系统安全在应用层安全中的重要地位,并且提出了一种新的基于操作安全的应用层 安全解决框架。
关键词 操作系统 应用层 安全 安全代理 安全总线 信息安全 计算机安全
下载PDF
虚拟轴机床安全集成功能的开发 被引量:1
11
作者 吴晓丹 《电子制作》 2014年第6X期223-223,共1页
虚拟轴五坐标卧式加工中心结构复杂、功能强大,机床本身分成三个安全区域:SB1机床工作区、SB2工作台站、SB3刀库,这三个区域既能独立工作,又要相互协调、制约。对安全区域的选择和运行进行安全监控;对抱闸控制等进行安全监控,应用西门... 虚拟轴五坐标卧式加工中心结构复杂、功能强大,机床本身分成三个安全区域:SB1机床工作区、SB2工作台站、SB3刀库,这三个区域既能独立工作,又要相互协调、制约。对安全区域的选择和运行进行安全监控;对抱闸控制等进行安全监控,应用西门子最先进的安全集成功能,可以实现对机床各种功能的安全控制。 展开更多
关键词 安全集成功能 安全极限开关SE 抱闸控制SBR
下载PDF
Design and Implementation of Traceability Management System of Agricultural Products Quality and Safety Based on Domestic Basic Software of China 被引量:1
12
作者 徐杰 张俊 +2 位作者 王秀徽 周正 杨宝祝 《Agricultural Science & Technology》 CAS 2012年第8期1811-1816,共6页
[Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method]... [Objective] To establish the traceability mechanism of agricultural products safety, and the application of promote domestic based software in the supervision area of agricultural products quality and safety. [Method] Through the analysis on the circulation characteristics of agricultural products, like fruits, vegetables, livestock and poultry, the agricultural products quality safety management and traceability query business component libraries were designed. Based on the run-time-supporting environment provided by domestic based software, traceability management system of agricultural products quality and safety was constructed. [Result] The traceability management system provided the information interaction and comprehensive management platform of agricultural product quality and safety based on domestic based software for the government, enterprises and consumers. [Conclusion] Through the application demonstration, the quality control and information traceability of full circulation of agricultural products was achieved effective and reliably, and the management level of agricultural products quality and safety was improved. 展开更多
关键词 Domestic based software Quality and safety of agricultural products Traceability management SOA framework Component library
下载PDF
AIRCRAFT FLIGHT SAFETY ANALYSIS IN LOW ALTITUDE AIRSPACE 被引量:6
13
作者 王世锦 隋东 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第2期147-153,共7页
The low altitude airspace will be open in China, general aviation flights are tremendously increased. Whether aircrafts can fly safely and how to determine the requirements of safety flight are the problems needed to ... The low altitude airspace will be open in China, general aviation flights are tremendously increased. Whether aircrafts can fly safely and how to determine the requirements of safety flight are the problems needed to be confirmed. Under this circumstances, based on the international Civil Aviation Organization(ICAO) criteria and the standards made by CAAC, this paper adopts the "See and Avoid" principle. Under the binding conditions of flight rules, visibility requirements, responding time, the aircraft speed, circle banking angle or the climbing angle, based on its study on aircraft dynamics principles, this paper establishes a mathematical collision avoidance model for head-to-head traffic and crossing converging traffic at the same level. And the safety separation requirements of the aircrafts in low altitude flight are equantitatively analyzed. Finally, the Matlab software is used to analyze the above method. The result shows that the safe traffic avoidance of the converging traffic at the same level meets certain flight conditions, while intersecting the traffic at the same level can safely avoid the collision. 展开更多
关键词 AIRCRAFT SAFETY flight dynamics low altitude airspace conflict avoiding
下载PDF
网业创新
14
《中国信息安全》 2010年第12期84-85,共2页
东软网络安全新任总经理赴任东软NetEye在即将进入第15个年头之际,东软集团任命赵鑫龙任网络安全营销中心总经理,完成新老交接工作,前任总经理贾彦生将担任东软集团副总裁兼企业解决方案事业部总经理。在过去近3年时间里,贾彦生率部在... 东软网络安全新任总经理赴任东软NetEye在即将进入第15个年头之际,东软集团任命赵鑫龙任网络安全营销中心总经理,完成新老交接工作,前任总经理贾彦生将担任东软集团副总裁兼企业解决方案事业部总经理。在过去近3年时间里,贾彦生率部在东软集团的大力支持下,在组织架构、业务结构上进行了大力度的优化。在产品领域除了一直投入的网管类产品外。 展开更多
关键词 国家认定企业技术中心 政务 SSR 域名解析服务器 信息安全产品 域名服务商 终端安全 创新 集团 高端用户 下一代互联网 总经理 CNGI 事业部 启明星辰 网络安全 系列设备 高交会 软安全
下载PDF
Stability analysis of cohesive soil embankment slope based on discrete element method 被引量:4
15
作者 XU Guang-ji ZHONG Kun-zhi +2 位作者 FAN Jian-wei ZHU Ya-jing ZHANG Yu-qing 《Journal of Central South University》 SCIE EI CAS CSCD 2020年第7期1981-1991,共11页
In order to study the safety factor and instability process of cohesive soil slope, the discrete element method(DEM) was applied. DEM software PFC2 D was used to simulate the triaxial test to study the influence of th... In order to study the safety factor and instability process of cohesive soil slope, the discrete element method(DEM) was applied. DEM software PFC2 D was used to simulate the triaxial test to study the influence of the particle micro parameters on the macroscopic characteristics of cohesive soil and calibrate the micro parameters of DEM model on this basis. Embankment slope stability analysis was carried out by strength reduction and gravity increase method, it is shown that the safety factor obtained by strength reduction method is more conservative, and the arc-shaped feature of the sliding surface under the gravity increase method is more obvious. Throughout the progressive failure process, the failure trends, maximum displacements, and velocity changes obtained by the two methods were consistent. When slope was destroyed, the upper part was cracked, the middle part was sheared, and the lower part was destroyed by extrusion. The conclusions of this paper can be applied to the safety factor calculation of cohesive soil slopes and the analysis of the instability process. 展开更多
关键词 embankment slope cohesive soil stability analysis numerical simulation PFC2D software safety factor
下载PDF
Numerical simulation and actual research on safety and suitable position of roadway driving along next goaf 被引量:2
16
作者 HAO Chao-yu WANG Ji-ren +1 位作者 DENG Cun-bao WAN Qing-sheng 《Journal of Coal Science & Engineering(China)》 2010年第2期125-128,共4页
In view of the stress concentration problem left by the joint coal seams mining since the reservation of the coal pillar, it was proposed that non-pillar mining technology be used in Dongrong No.2 coal mine. The numer... In view of the stress concentration problem left by the joint coal seams mining since the reservation of the coal pillar, it was proposed that non-pillar mining technology be used in Dongrong No.2 coal mine. The numerical simulation software FLAG2D was used to draw the relationship between surrounding rock deformation of roadway driving along next goaf and the size of the coal pillar, so the safety and suitable position of roadway was determined. The distribution of lateral abutment pressure was measured by using the ZYJ-30 drilling stress gauge in the coal wall. The conclusions of the numerical simulation were verified. 展开更多
关键词 roadway driving along next goaf numerical simulation width of coal pillar abutment pressure
下载PDF
Numerical simulation of vegetated mine dump slope with reference to small plants 被引量:4
17
作者 Rai Rajesh Shrivastva B.K. 《International Journal of Mining Science and Technology》 SCIE EI 2014年第1期111-115,共5页
The present paper discusses the effects of small plants on the dump mass reinforcement and slope stability.The roots of smaller plants(such as grasses and shrubs)do not go deep.However,they stabilize the slope by bind... The present paper discusses the effects of small plants on the dump mass reinforcement and slope stability.The roots of smaller plants(such as grasses and shrubs)do not go deep.However,they stabilize the slope by binding the upper layer of dump slope.Shear strength of the dump mass with and without root reinforcement is determined by laboratory shear box instrument.The increased cohesion(apparent cohesion)of upper layer of the dump mass due to plants is determined by fabricated shear box.The kinetic behavior of the dump has been investigated using the FLAC software.The factor of safety has been calculated in order to determine the possible effect of small plants on the stability of the dump slope.It is observed that the small plants do not significantly improve the factor of safety(FOS)of slope.However,it could be useful for early stabilization.The grasses quickly bind the upper surface,whereas shrubs too immensely strengthen the stability of the dump in the initial stage. 展开更多
关键词 Mine waste dumpSlope stability Vegetation Small plants Numerical modeling
下载PDF
Contrastive Analysis of Software Networks Based on Different Coupling Relationships 被引量:3
18
作者 XU Guoai GAO Yang +2 位作者 QI Yana PENG Junhao TANG Xianjing 《China Communications》 SCIE CSCD 2010年第4期76-82,共7页
Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy... Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively. 展开更多
关键词 Software System Software Networks Coupling Relationship Degree Distribution
下载PDF
Software Composition of Different Security Level Components 被引量:1
19
作者 Frank Tsui Edward Jung Sheryl Duggins 《Computer Technology and Application》 2011年第11期835-842,共8页
In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associat... In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associating a component to a software system. The component itself may be informational or functional and carry a certain level of security attribute. The authors first show that the security attributes or properties form a lattice structure when combined with the appropriate least upper bound and greatest lower bound type of operators. Three composition operators, named C l, C2 and C3 are developed. The system's security properties resulting from these compositions are then studied. The authors discuss how different composition operators maintain, relax and restrict the security properties. Finally, the authors show that C1 and C2 composition operators are order-sensitive and that C3 is order-insensitive. 展开更多
关键词 Software composition SECURITY component-design.
下载PDF
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
20
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部