期刊文献+
共找到154篇文章
< 1 2 8 >
每页显示 20 50 100
A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
1
作者 ZHANG Shaomin WANG Baoyi ZHOU Lihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1827-1830,共4页
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ... PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also. 展开更多
关键词 access control RBAC(role-based access controd TRUST CACHE PMI privilege management infrastructure
下载PDF
An Internet Key Exchange Protocol Based on Public Key Infrastructure 被引量:2
2
作者 朱建明 马建峰 《Journal of Shanghai University(English Edition)》 CAS 2004年第1期51-56,共6页
Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for provi... Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. 展开更多
关键词 AUTHENTICATION ENCRYPTION Interent key exchange(IKE) public key infrastructure(PKI).
下载PDF
Public Key Infrastructure: An Enhanced Validation Framework
3
作者 Paul Danquah Henoch Kwabena-Adade 《Journal of Information Security》 2020年第4期241-260,共20页
Public Key Infrastructure (PKI) is a comprehensive information security framework for providing secure information and communication over the internet. Its need and use has grown over the years and continually grows. ... Public Key Infrastructure (PKI) is a comprehensive information security framework for providing secure information and communication over the internet. Its need and use has grown over the years and continually grows. This research work examines the current PKI framework’s validation process as operated by vendors and subscribers to identify the drawbacks and propose enhanced approaches to its validation mechanism. Using an approach of reviewing secondary data, critical weaknesses of integrity, proof of trust and single point-of-failure were identified with the current PKI framework. This study therefore advances proposed solutions to address the identified weaknesses by specifically introducing multiple Certificate Authorities, storage, visibility and searchability of subscriber information in public repository. A comprehensive detail of its implementation is proposed to address the identified weaknesses of uncertain integrity, trust for certificate authorities and prevent a single point of failure. Furthermore, the proposed enhancements are validated with the protection motivation theory and a framework for empirically testing the enhancements is suggested. Further research would be required to factor in multi-factor authentication without compromising performance. 展开更多
关键词 SECURITY public key infrastructure PKI Validation Cyber Security
下载PDF
Green Infrastructure Practice and a Sustainability Key Performance Indicators Framework for Neighbourhood-Level Construction of Sponge City Programme 被引量:3
4
作者 Jing Sun Ali Cheshmehzangi Sisi Wang 《Journal of Environmental Protection》 2020年第2期82-109,共28页
In recent years, the Sponge City program (SCP) of China, as a sustainable stormwater management approach, has been strengthened as a national strategic level program. The Green Infrastructure (GI), due to its multi-ob... In recent years, the Sponge City program (SCP) of China, as a sustainable stormwater management approach, has been strengthened as a national strategic level program. The Green Infrastructure (GI), due to its multi-objective and multi-benefits, has been adopted as an important measure of this new nationwide initiative. However, there is a lack of a comprehensive quantitative evaluation system for neighbourhood scale SCP. Hence, in the process of GI plan optimization, selection of implementation methods to balance its multi-benefits has become one of the key obstacles in the practice of SCP. To support robust decision making on multi-objective GI planning and comprehensive assessment, the analytic hierarchy process (AHP) has been used as a structural and systematic technique. In addition, a set of sustainability key performance indicators (KPIs) including requisite dimensions is the foundation for neighbourhood scale sustainability. Hence, AHP-based evaluation system including selection, weighting and ranking of the KPIs, is defined as a key performance indicator framework (KPIF), which is still in need for further development. Taking the GI planning for the Liangnong, Siming Lake sponge node restoration as an example, this paper develops KPIF with a comprehensive evaluation system for high-quality “Sponge Node” transitional construction. This KPIF consists of three basic criteria: “Environmental Performance”, “Economic and Adaptability Performance”, and “Social-cultural Performance and Wellbeing Performance”. In addition, 15 weighted KPIs are concluded and amongst them, the followings were relatively high: weight of the ATRCR, the promotion of biodiversity, the construction cost saving, the maintenance cost saving, and the level of recreational and wellbeing improvements for all people. In addition, the developed KPIF provides a reference for similar program’s decision-making, not only for the Jiangnan area of China, but also for quantitatively comprehensive evaluations of SCP in other regions. 展开更多
关键词 SUSTAINABILITY SPONGE CITY Ecosystem Services STORMWATER management key Performance Indicators FRAMEWORK Green infrastructure
下载PDF
Reasons for a Cultural Renovation of the Road Infrastructure Design
5
作者 Alfonso Annunziata Francesco Annunziata 《Journal of Civil Engineering and Architecture》 2015年第8期961-969,共9页
Built environments are undergoing a state of crisis, due to fragmentation and obsolescence: consolidated urban areas, suburbs and fringe areas require to be restored so as to recover a sense of vivid places and to av... Built environments are undergoing a state of crisis, due to fragmentation and obsolescence: consolidated urban areas, suburbs and fringe areas require to be restored so as to recover a sense of vivid places and to avoid segregation. Fabric of routes and voids can be considered as a medium in order to structure a landscape, to manage and govern a region, to nurture its unique subculture. A structure of bonds is to be designed to promote a rapid and safe movement of resources, of people, of ideas, even from and to most remote sites. Infrastructure can foster a vast economic development, and also, a profound social and cultural development. 展开更多
关键词 ADAPTATION infrastructure LANDSCAPE management public space interactions.
下载PDF
A Key Management Scheme for ZigBee in AMI of Smart Grid
6
作者 Jianquan Liang Xianji Jin +2 位作者 Shuidong Dai Weiming Tong Zhongwei Li 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2016年第3期53-60,共8页
Advanced metering infrastructure( AMI) is a critical part of the smart grid,and ZigBee is playing an increasingly important role in AMI.The cyber security is the prerequisite to ensure the reliable operation of AMI.To... Advanced metering infrastructure( AMI) is a critical part of the smart grid,and ZigBee is playing an increasingly important role in AMI.The cyber security is the prerequisite to ensure the reliable operation of AMI.To guarantee the ZigBee communication security in AMI,a key management scheme based on the elliptic curve cryptosystem( ECC) is proposed.According to the ways of information transformation in AMI,the scheme is categorized as unicast communication key management process and multicast communication key management process.And in the scheme,the selection of elliptic curve,the calculation of ZigBee node's ECC public key and private key,the establishment and distribution of the link key in unicast communication,and the establishment and distribution of the network key in multicast communication are elaborated.The analysis results show that the proposed key management scheme is secure,and consumes less memory and energy,thus,can meet the demands of communication security of AMI. 展开更多
关键词 advanced METERING infrastructure (A M I) ZIGBEE key management ELLIPTIC CURVE cryptography(E C C ) smart grid
下载PDF
The Implications of Population Decline and Fiscal Austerity on Public Nature:Insights From the Evolution of Urban Park Management System in Japan
7
作者 Xizi XU Fumihiko SETA +1 位作者 Noriko AKITA Kai ZHOU 《景观设计学(中英文)》 CSCD 2024年第4期8-25,共18页
Facing challenges of population decline and fiscal austerity,Japan has implemented a series of initiatives to promote public-private partnerships(PPP)to ensure the sustainability of urban parks and revitalize urban sp... Facing challenges of population decline and fiscal austerity,Japan has implemented a series of initiatives to promote public-private partnerships(PPP)to ensure the sustainability of urban parks and revitalize urban spaces.These initiatives,while alleviating the government’s financial burdens on parks,have also raised concerns about the potential erosion of publicness and public interests resulted from the commercialization of public assets.This paper reviews the evolution of Japan’s urban park management system after World War II—including three phases of being purely public goods,initiating marketization,and diversifying management entities.The functions of parks have continuously enriched,and the construction,management,and operational modes have shifted from government-led towards multi-stakeholder participation,along with expanded funding sources.By examining the PPP types,driving forces,implementation mechanisms and challenges in urban park management,this paper points out that,in different eras and social contexts,the Japanese government has kept adjusting its role to maximize public interests.This has proactively updated the implications of publicness in infrastructure like urban parks,from a post-war opposite of publicness versus privateness on ownership,to the participation of private capital for a higher efficiency,and finally to a community for a stronger regional competitiveness.The reforms of urban park management system in Japan offer significant lessons and insights for urban infrastructure management in other countries and regions. 展开更多
关键词 publicness Landscape Justice public-Private Partnership “Private Finance Initiative”System for Parks Urban Parks management System Urban infrastructure
原文传递
A Photo Certificate-A Framework for Generating Visualized Public Key Certificates
8
作者 Wei-Bin Lee Chien-Chen Huang Chia-Chen Lin 《Journal of Electronic Science and Technology》 CAS 2011年第4期339-344,共6页
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meani... In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is eryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the eertificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and cheek whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate. 展开更多
关键词 AUTHENTICATION CERTIFICATE public key infrastructure two-layer verifications WATERMARKING X.509.
下载PDF
区块链在PKI安全中的应用研究
9
作者 夏玲玲 王群 +1 位作者 马卓 梁广俊 《计算机科学与探索》 CSCD 北大核心 2024年第10期2573-2593,共21页
重应用、轻防御的设计思想致使传输控制协议/网际协议(TCP/IP)体系结构设计之初就缺乏内生安全属性,使得公钥基础设施(PKI)作为实现互联网不同实体之间通信真实性、完整性、机密性和不可抵赖性的安全治理权威架构自提出以来就备受关注,... 重应用、轻防御的设计思想致使传输控制协议/网际协议(TCP/IP)体系结构设计之初就缺乏内生安全属性,使得公钥基础设施(PKI)作为实现互联网不同实体之间通信真实性、完整性、机密性和不可抵赖性的安全治理权威架构自提出以来就备受关注,同时PKI自身因其中心化机制带来的单点故障和单一信任等安全威胁也成为近年来研究者关注的热点。随着区块链技术逐渐应用于信息安全领域,利用区块链的去中心化、分布式账本、防篡改、公开透明等特点来解决原生PKI及其演进过程中出现的各类安全问题成为一个研究方向和重点。根据PKI技术的发展及区块链技术的应用,将解决原生PKI安全的方法分为以信任网络(WoT)技术和证书透明度(CT)机制为主的不依赖区块链的解决方案,保留认证机构(CA)核心功能的融入区块链技术的中心化PKI方案,以及用区块链完全替代CA功能的基于区块链的去中心化PKI方案。介绍了原生PKI的安全现状,讨论了分别利用WoT技术和CT机制对原生PKI的安全性进行改造的具体方法,重点分析了融入区块链技术的中心化PKI以及基于区块链的去中心化PKI的设计思想,并分别选择了部分典型应用场景就其实现方法和应用特点进行了有针对性的剖析,对区块链在PKI安全中的应用研究进行了展望。 展开更多
关键词 区块链 公钥基础设施 网络安全 证书管理 认证机构
下载PDF
大数据平台在政府绩效管理中的应用研究
10
作者 陈少强 戴琳 《兰州大学学报(社会科学版)》 北大核心 2024年第4期166-176,共11页
厘清大数据平台对政府绩效管理的赋能机制,有助于推动数字政府建设和提高政府治理现代化水平。从数据、技术、组织和环境四个维度剖析大数据平台对宏观层面政府绩效管理的赋能机制。具体来看,大数据平台通过强化绩效管理对象精准识别、... 厘清大数据平台对政府绩效管理的赋能机制,有助于推动数字政府建设和提高政府治理现代化水平。从数据、技术、组织和环境四个维度剖析大数据平台对宏观层面政府绩效管理的赋能机制。具体来看,大数据平台通过强化绩效管理对象精准识别、实现动态全程监控、提高绩效分析科学化水平、完善信息披露机制、重塑管理流程和组织结构及优化组织外部环境赋能政府绩效管理。基于全国PPP综合信息平台的案例研究后发现,大数据平台在政府宏观风险管理、技术效率提升、组织协调和稳定外部环境预期等方面发挥积极作用,同时也存在部门间数据共享不足、技术应用不充分、组织结构融合性不够以及外部监管薄弱等问题。政府绩效管理的数字化进程不可避免,应明确政府绩效管理的功能定位,提高数据共享度、拓展技术应用空间、增强平台建设的组织融合度以及优化平台的环境拟合度,从而提高其应用于政府绩效管理的质量和效果。 展开更多
关键词 大数据平台 政府绩效管理 全国PPP综合信息平台 数字政府 新型数字基础设施
下载PDF
关于公路水路公共基础资产入账分析系统的研究
11
作者 陈辅伟 杨鸿 +1 位作者 何俊丽 吴杰 《智能建筑与智慧城市》 2024年第1期57-59,共3页
为解决公路、水路交通全域实体资产数字化治理、数字化管理系列等难题,本课题以数据为基础,覆盖公路、水路、桥梁、隧道、机电建设、服务区、停车区等资产建管养核心属性,并在此基础上融合资产财务、审计业务,形成数字资产与实体资产的... 为解决公路、水路交通全域实体资产数字化治理、数字化管理系列等难题,本课题以数据为基础,覆盖公路、水路、桥梁、隧道、机电建设、服务区、停车区等资产建管养核心属性,并在此基础上融合资产财务、审计业务,形成数字资产与实体资产的数字化管理系统。根据公路水路设施资产盘点入账制定的目标,确立了既有技术路线,通过采用前台+后台,构建公路水路设施资产统计管理系统,在此基础上,此系统结合GIS地理信息技术,打造实体资产数字地图,结合资产数据映射,财会审计映射深层应用,实现资产数字化静态与动态完整化镜像构建。 展开更多
关键词 公路水路公共基础设施 公共基础设施资产 国有资产管理
下载PDF
铅蓄电池绿色工厂设计
12
作者 鱼澎 包戈 +2 位作者 余小军 刘明军 冯谦 《蓄电池》 CAS 2024年第1期1-6,50,共7页
为了实现铅蓄电池行业健康、可持续发展的绿色生产之路,总结了铅蓄电池绿色工厂设计经验,对标《绿色工厂评价通则》,汇总建筑工程、工艺设备、公用设备、环保系统、能源系统、管理系统和资源投入等设计要点,介绍了铅蓄电池绿色工厂的设... 为了实现铅蓄电池行业健康、可持续发展的绿色生产之路,总结了铅蓄电池绿色工厂设计经验,对标《绿色工厂评价通则》,汇总建筑工程、工艺设备、公用设备、环保系统、能源系统、管理系统和资源投入等设计要点,介绍了铅蓄电池绿色工厂的设计要点,为铅蓄电池行业绿色工厂设计提供参考。 展开更多
关键词 绿色工厂 铅酸蓄电池 基础设施 工艺设备 公用设备 环境管理 污染物 能源 资源投入 职业健康安全
下载PDF
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
13
作者 Hossein Fereidooni Hassan Taheri Mehran Mahramian 《International Journal of Communications, Network and System Sciences》 2012年第4期228-237,共10页
Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In thi... Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats. 展开更多
关键词 Virtual PRIVATE Networks (VPNs) public key infrastructure Authentication Internet key Exchange (IKE) BAN-Logic
下载PDF
国家层面联系的重大水利项目PPP试点实施情况跟踪 被引量:1
14
作者 罗琳 严婷婷 +2 位作者 庞靖鹏 李香云 吴宇涵 《水利发展研究》 2023年第5期1-5,共5页
我国政府和社会资本合作(PPP)模式经历了从探索试点到发展普及阶段,水利等有关部门也在不断探索完善水利基础设施PPP路径和相关政策。文章通过跟踪国家层面联系的首批重大水利项目PPP试点进展,总结亮点做法并提炼相关经验,对推进实施过... 我国政府和社会资本合作(PPP)模式经历了从探索试点到发展普及阶段,水利等有关部门也在不断探索完善水利基础设施PPP路径和相关政策。文章通过跟踪国家层面联系的首批重大水利项目PPP试点进展,总结亮点做法并提炼相关经验,对推进实施过程中存在问题及产生原因展开分析,并提出针对性的政策意见,以期为当前重大水利基础设施PPP的高质量发展提供参考。 展开更多
关键词 PPP模式 重大水利项目 水利基础设施建设 顶层设计 回报机制 运作模式 规范管理
下载PDF
略论城市公共基础设施资产管理 被引量:1
15
作者 刘志 《城市观察》 2023年第5期151-157,164,共8页
随着中国城镇化的快速推进,大量的城市基础设施建成并投入运营,对城市公共基础设施资产管理提出了迫切需求。本文着重介绍了城市公共基础设施资产管理的关键要素和实施步骤,其中,常见的关键要素包括存量资产清查,资产状况、利用和绩效,... 随着中国城镇化的快速推进,大量的城市基础设施建成并投入运营,对城市公共基础设施资产管理提出了迫切需求。本文着重介绍了城市公共基础设施资产管理的关键要素和实施步骤,其中,常见的关键要素包括存量资产清查,资产状况、利用和绩效,维护管理,对比目标的绩效完成情况,资产更新规划,资产价值估算,优先事项的拟定等,实施过程由如下支柱支撑,包括战略、组织架构、人力和财力资源、外部专业知识的引进。本文可为城市运用经济和财务的有效方式,维持公共基础设施的服务效率、安全性能以及服务年限的可持续性提供参考。 展开更多
关键词 公共基础设施 资产管理 IAM 资产价值估算 资产利用绩效
下载PDF
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks
16
作者 Qingqing Ning Chunhua Jin +2 位作者 Zhiwei Chen Yongliang Xu Huaqi Lu 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2061-2078,共18页
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare pro... Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological signals.WBANs provide a mechanism for collecting,storing,and transmitting physiological data to healthcare providers.However,the open wireless channel and limited resources of sensors bring security challenges.To ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)environment.CLC could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in PKI.While PKI is suited for the server because it is widely used on the Internet.Furthermore,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor is.The construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single step.Under the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most effective.Compared to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively. 展开更多
关键词 Wireless body area networks certificateless cryptosystem public key infrastructure SECURITY ring singncryption
下载PDF
农村基础设施和公共服务设施配建需求调研及对策
17
作者 李婕 高秀秀 +1 位作者 李阳 张晓彤 《农业资源与环境学报》 CAS CSCD 北大核心 2023年第5期1169-1179,共11页
针对我国农村地区基础设施和公共服务设施普遍存在缺乏统筹规划、资源配置不均衡、共享性差等问题,本研究采取现场调查、座谈交流等方式对5个典型地区18个乡镇26个村350余户居民进行设施使用满意度和需求调研,并在此基础上辨析设施配建... 针对我国农村地区基础设施和公共服务设施普遍存在缺乏统筹规划、资源配置不均衡、共享性差等问题,本研究采取现场调查、座谈交流等方式对5个典型地区18个乡镇26个村350余户居民进行设施使用满意度和需求调研,并在此基础上辨析设施配建与管理的主要影响因素。调研结果显示:村民对基础设施的满意度普遍高于公共服务设施,不同年龄和家庭收入人群的满意度和需求表现出一定的差异性。村民对基础设施的需求主要集中在设施的建设形式、使用安全性,对公共服务设施的需求主要集中在设施的便利性和服务质量。基于调研数据得出,影响农村基础设施和公共服务设施配建与管理的主要因素包括经济发展水平、资源环境条件、技术支撑能力和基层治理能力。最后,研究从区域统筹、时序协调、技术优选、治理升级4个方面提出基层政府进行基础设施和公共服务设施配建与管理的对策。 展开更多
关键词 基础设施 公共服务设施 配建 管理 对策
下载PDF
中国乡村绿色基础设施建设研究 被引量:1
18
作者 单垚 《智慧农业导刊》 2023年第8期76-79,共4页
该文探讨乡村人居环境质量堪忧的问题,并指出绿色基础设施的重要性和实施要点。通过现有文献和案例分析,提出乡村绿色基础的关键特征、规划设计的要素、资金投入与管理技术应用和公众参与等方面的建议,旨在促进乡村绿色基础设施建设的... 该文探讨乡村人居环境质量堪忧的问题,并指出绿色基础设施的重要性和实施要点。通过现有文献和案例分析,提出乡村绿色基础的关键特征、规划设计的要素、资金投入与管理技术应用和公众参与等方面的建议,旨在促进乡村绿色基础设施建设的全面发展。 展开更多
关键词 乡村绿色基础设施 可持续发展 公众参与 技术导入 管理维护
下载PDF
基于PKI体系的电力物资信息系统安全机制研究
19
作者 王鹏 李松 +2 位作者 豆科 王治豪 李珂 《电子设计工程》 2023年第22期157-161,共5页
针对传统安全机制缺乏动态管控、难以满足复杂系统安全需求等问题,提出了一种基于PKI体系的电力物资信息系统安全机制。该机制结合公钥基础设施(PKI)与授权管理基础设施(PMI)构建了PKI-PMI体系,从而解决了单一PKI体系无法实现权限管理... 针对传统安全机制缺乏动态管控、难以满足复杂系统安全需求等问题,提出了一种基于PKI体系的电力物资信息系统安全机制。该机制结合公钥基础设施(PKI)与授权管理基础设施(PMI)构建了PKI-PMI体系,从而解决了单一PKI体系无法实现权限管理的问题。同时,还设计了基于实体行为的可信度模型用于感知用户行为的动态变化,有效提高了用户信息的可靠性,并进一步保证了系统信息安全。实验结果表明,当每小时发生1000次网络攻击时,所提机制的安全性仍高于85%,且运行时间仅为15.28 ms,能够较好地保证电力物资信息系统的安全。 展开更多
关键词 安全机制 公钥基础设施 授权管理基础设施 PKI-PMI体系 可信度模型 感知用户行为
下载PDF
联盟链分布式证书管理解决方案
20
作者 李亚荣 杨艳梅 +2 位作者 白健 杨文兵 邱锋 《信息安全与通信保密》 2023年第7期100-109,共10页
面对当前联盟链系统身份管理机制不完善的问题,提出一种联盟链分布式证书管理解决方案。将区块链的系统链与证书管理链进行融合设计,基于证书准入机制,结合智能合约和共识算法技术,构建联盟链分布式CA协同管理机制,联盟链参与组织自签... 面对当前联盟链系统身份管理机制不完善的问题,提出一种联盟链分布式证书管理解决方案。将区块链的系统链与证书管理链进行融合设计,基于证书准入机制,结合智能合约和共识算法技术,构建联盟链分布式CA协同管理机制,联盟链参与组织自签生成组织根证书,并通过各自CA系统管理组织内的节点和用户,组织之间通过证书管理链共享根证书、撤销列表等数据,实现组织间互信互通、节点用户跨组织的身份认证和授权。 展开更多
关键词 区块链 联盟链 证书管理 公开密钥基础设施
下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部