期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
网络粗俗语研究 被引量:2
1
作者 陈琳琳 《信阳农业高等专科学校学报》 2009年第4期108-110,共3页
网络粗俗语是网络环境下用粗野的或恶意的话使人遭受耻辱的语言。它实际上是一种网络环境中的詈骂行为。按照造词方式可将其分为以下七类:汉语拼音减缩类、数字谐音类、词义转换类、旧词引申类、转换港台流行语类、英文类、符号表情类... 网络粗俗语是网络环境下用粗野的或恶意的话使人遭受耻辱的语言。它实际上是一种网络环境中的詈骂行为。按照造词方式可将其分为以下七类:汉语拼音减缩类、数字谐音类、词义转换类、旧词引申类、转换港台流行语类、英文类、符号表情类。和骂詈语相比,网络粗俗语具有隐据性、简约型、反传统性三大特征。提高网民素质,规范网络语言至关重要。 展开更多
关键词 网络粗俗语 骂詈语 詈骂 隐据性 简约 反传统
下载PDF
Big Data Security and Privacy: A Review 被引量:3
2
作者 MATTURDI Bardi ZHOU Xianwei +1 位作者 LI Shuai LIN Fuhong 《China Communications》 SCIE CSCD 2014年第A02期135-145,共11页
While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contrad... While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy. 展开更多
关键词 big data value of big data security and privacy
下载PDF
Ontology-based Knowledge Extraction from Hidden Web 被引量:1
3
作者 宋晖 马范援 刘晓强 《Journal of Donghua University(English Edition)》 EI CAS 2004年第5期73-78,共6页
Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not ref... Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly. 展开更多
关键词 knowledge service hidden web ONTOLOGY data extraction
下载PDF
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
4
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
下载PDF
Cryptanalysis of an identity-based public auditing protocol for cloud storage 被引量:4
5
作者 Li-bing WU Jing WANG +1 位作者 De-biao HE Muhammad-Khurram KHAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第12期1972-1977,共6页
Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud ... Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloud data to simplify key management and alleviate the burden of check tasks. They claimed that NaEPASC enables a third- party auditor (TPA) to verify the integrity of outsourced data with high efficiency and security in a cloud computing environment. However, in this paper, we pinpoint that NaEPASC is vulnerable to the signature forgery attack in the setup phase; i.e., a malicious cloud server can forge a valid signature for an arbitrary data block by using two correct signatures. Moreover, we demonstrate that NaEPASC is subject to data privacy threats in the challenge phase; i.e., an external attacker acting as a TPA can reveal the content of outsourced data. The analysis shows that NaEPASC is not secure in the data verification process. Therefore, our work is helpful for cryptographers and engineers to design and implement more secure and efficient identitv-based nublic alldit^n~ .~cheme~ far clnne] ~tnr^q~ 展开更多
关键词 Cloud data Public auditing Data integrity Data privacy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部