期刊文献+
共找到826篇文章
< 1 2 42 >
每页显示 20 50 100
Reflections and Improvements on China’s Asset-Backed Securities Information Disclosure System
1
作者 Zhao Mingxin 《Contemporary Social Sciences》 2024年第1期122-136,共15页
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s... Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures. 展开更多
关键词 asset-backed securities asset securitization information disclosure
下载PDF
Path of the Information Asymmetry of Asset Backed Securitization—Information Game Analysis of Embedded Block Chain Technology 被引量:2
2
作者 Xiaoxiao Zhang Wen Shi 《International Journal of Communications, Network and System Sciences》 2018年第6期133-146,共14页
In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which can... In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility. 展开更多
关键词 BLOCK CHAIN INFORMATION Asymmetry INFORMATION Game asset backed securITIZATION
下载PDF
A Framework for Systematic Classification of Assets for Security Testing 被引量:2
3
作者 Sadeeq Jan Omer Bin Tauqeer +5 位作者 Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah 《Computers, Materials & Continua》 SCIE EI 2021年第1期631-645,共15页
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such... Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them. 展开更多
关键词 securITY security testing PRIVACY asset classification
下载PDF
Impacts of livelihood assets on livelihood security in drought-prone Gamo lowlands of southwest Ethiopia 被引量:1
4
作者 Thomas Toma Tora Degefa Tolossa Degaga Abera Uncha Utallo 《Geography and Sustainability》 2022年第1期58-67,共10页
Livelihood assets are a matter of high concern for secured survival.Drought-prone Gamo lowland households have differential access to livelihood resources which indicates the varying capacity of resisting to shocks.Th... Livelihood assets are a matter of high concern for secured survival.Drought-prone Gamo lowland households have differential access to livelihood resources which indicates the varying capacity of resisting to shocks.The main objective of this study is to explore the impacts of livelihood assets on livelihood security in the drought-prone Gamo lowlands.Multistage sampling procedures were employed to select the study sites and sample respondents.Primary data of households’capital assets and livelihood security status were produced from 285 survey households,agricultural experts,key informants,focus group discussants,and field observation through transect walks.Descriptive and inferential statistics were used to analyze quantitative data,whereas discussions and annotations were employed for analyzing qualitative data.The Sustainable Livelihoods Framework is used with modifications to schematize the study conceptually.The findings indicated that the study households possessed combinations of livelihood resources differentially.Financial and natural capitals were found to be the most deficient and better-accessed capitals,respectively.The study also showed that lowland residents’access to assets has significant indications of livelihood security.Households’poor access to assets such as financial,information,and social capital demands raised attention of the concerned stakeholders and policy debates in the drought-prone rural setup.Hence,it has been concluded that the more assets are accessed,the stronger the capacity of the households to resist shocks,and better the livelihood security.Accordingly,enhancing people’s access to multiple livelihood assets is suggested to sustainably secure livelihoods. 展开更多
关键词 asset hexagon Gamo lowlands Livelihood security Sustainable livelihoods framework
下载PDF
Asset-backed Securitization——a New Financing Channel for the Telecom Industry 被引量:3
5
作者 WU Hong (School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第2期62-68,共7页
Telecom enterprises are in urgent need of a large amount of funds forupdating networks and expanding market shares, while asset-backed Securitization is the most rapidlyand vigorously growing product of financial inno... Telecom enterprises are in urgent need of a large amount of funds forupdating networks and expanding market shares, while asset-backed Securitization is the most rapidlyand vigorously growing product of financial innovation in the international capital market. Sincetelecom asset is characterized by long recovery period, poor liquidity, high quality and stable cashflow, which are the basic conditions for using asset-backed Securitization to finance, asset-backedSecuritization can be a new financing way for telecom enterprises. 展开更多
关键词 asset-backed securitization telecom industry FINANCING
原文传递
A Systematic Approach for Cyber Security in Vehicular Networks 被引量:1
6
作者 Farhan Ahmad Asma Adnane Virginia N. L. Franqueira 《Journal of Computer and Communications》 2016年第16期38-62,共26页
Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim to ensure road safety and enhance drivers’ comfort. In VANET, the vehicles communicate or collaborate with each other and wit... Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim to ensure road safety and enhance drivers’ comfort. In VANET, the vehicles communicate or collaborate with each other and with adjacent infrastructure by exchanging significant messages, such as road accident warnings, steep-curve ahead warnings or traffic jam warnings. However, this communication and other assets involved are subject to major threats and provide numerous opportunities for attackers to launch several attacks and compromise security and privacy of vehicular users. This paper reviews the cyber security in VANET and proposes an asset-based approach for VANET security. Firstly, it identifies relevant assets in VANET. Secondly, it provides a detailed taxonomy of vulnerabilities and threats on these assets, and, lastly, it classifies the possible attacks in VANET and critically evaluates them. 展开更多
关键词 Vehicular Networks Ad Hoc Networks Cyber security PRIVACY VULNERABILITIES Threats assetS Smart City
下载PDF
Empirical analysis on risk of security investment
7
作者 AN Peng LI Sheng-hong 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2009年第2期127-134,共8页
The paper analyzes the theory and application of Markowitz Mean-Variance Model and CAPM model. Firstly, it explains the development process and standpoints of two models and deduces the whole process in detail. Then 3... The paper analyzes the theory and application of Markowitz Mean-Variance Model and CAPM model. Firstly, it explains the development process and standpoints of two models and deduces the whole process in detail. Then 30 stocks are choosen from Shangzheng 50 stocks and are testified whether the prices of Shanghai stocks conform to the two models. With the technique of time series and panel data analysis, the research on the stock risk and effective portfolio by ORIGIN and MATLAB software is conducted. The result shows that Shanghai stock market conforms to Markowitz Mean-Variance Model to a certain extent and can give investors reliable suggestion to gain higher return, but there is no positive relation between system risk and profit ratio and CAPM doesn't function well in China's security market. 展开更多
关键词 Markowitz Mean-Variance Model Capital asset Pricing Model time series analysis regressive analysis securities market
下载PDF
Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform
8
作者 Leilei Li Yansong Wang +5 位作者 Dongjie Zhu Xiaofang Li Haiwen Du Yixuan Lu Rongning Qu Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2023年第7期771-791,共21页
With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a si... With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a single-node mode and cannot parallelly process large-scale tasks,which cannot meet the current needs of the industry.To address the above issues,this paper proposes a distributed network asset detection and vulnerability warning platform(Dis-NDVW)based on distributed systems and multiple detection tools.Specifically,this paper proposes a distributed message sub-scription and publication system based on Zookeeper and Kafka,which endows Dis-NDVW with the ability to parallelly process large-scale tasks.Meanwhile,Dis-NDVW combines the RangeAssignor,RoundRobinAssignor,and StickyAssignor algorithms to achieve load balancing of task nodes in a distributed detection cluster.In terms of a large-scale task processing strategy,this paper proposes a task partitioning method based on First-In-First-Out(FIFO)queue.This method realizes the parallel operation of task producers and task consumers by dividing pending tasks into different queues according to task types.To ensure the data reliability of the task cluster,Dis-NDVW provides a redundant storage strategy for master-slave partition replicas.In terms of distributed storage,Dis-NDVW utilizes a distributed elastic storage service based on ElasticSearch to achieve distributed storage and efficient retrieval of big data.Experimental verification shows that Dis-NDVW can better meet the basic requirements of ultra-large-scale detection tasks. 展开更多
关键词 Distributed network security network asset detection vulnerability warning
下载PDF
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
9
作者 Joseph Elias Mbowe Irina Zlotnikova +1 位作者 Simon S. Msanjila George S. Oreku 《Journal of Information Security》 2014年第4期166-177,共12页
The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organizatio... The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organization to another, it prompts the threat analysis tools be integrated with organization’s information security policy so as to ensure security controls at local settings. However, it has been noted that the current tools for threat assessment processes have not encompassed information security policy for effective security management (i.e.?confidentiality, integrity and availability) based on organization’s risk appetite and culture. The information security policy serves as a tool to provide guidance on how to manage and secure all business operations including critical assets, infrastructure and people in the organization. This guidance (e.g. usage and controls) facilitates the provisions for threat assessment and compliance based on local context. The lack of effective threat assessment frameworks at local context have promoted the exposure of critical assets such as database servers, mails servers, web servers and user smart-devices at the hand of attackers and thus increase risks and probability to compromise the assets. In this paper we have proposed a conceptual framework for security threat assessment based on organization’s information security policy. Furthermore, the study proposed the policy automation canvas for provision of a methodology to alert the security managers what possible threats found in their organizations for quick security mitigation without depending on security expertise. 展开更多
关键词 CRITICAL asset INFORMATION securITY INFORMATION securITY POLICY THREAT Analysis THREAT Assessment securITY THREAT Visualization
下载PDF
Human Security, Poverty Pattern and Social Order in Igbo Rural Communities of Contemporary Nigeria
10
作者 Iwundu Anthony Onyekwere 《Journalism and Mass Communication》 2017年第8期472-479,共8页
The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty,... The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty, social disorder, poor coherence and poor integration appear to haunt them and the gravity is felt more in the rural communities. The factors are traceable to many pathetic issues. The pathological consequences do affect Igbo stability and navigation in the Nigerian socio-economic environment. The causality constitutes the physical, human, natural, financial and social assets. It is recommended, among others, that the people should return to core values and norms, stick to their own noble identities, have a framework for tackling insecurity and hunger, target the youth in poverty reduction measures and tackle the herdsmen menace. Equally, the abused philosophies used to support dangerous and strange behavior should be tackled. 展开更多
关键词 human security poverty pattern social order rural community assetS integration
下载PDF
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
11
作者 Mohamed Shohoud 《Journal of Information Security》 2023年第2期152-180,共29页
As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could h... As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could have devastating effects on the operations and reputation of these companies. Preventing such cyberattacks is crucial. Especially, with the significance of the Egyptian oil and gas downstream sector to the local economy and the fact that many of these connected systems are sometimes managed remotely. This paper examines the value of the ISO 27001 standard in mitigating the effect of cyber threat and seeks to inspire decision-makers to the importance of the proactive measures to strengthen their organization’s cybersecurity posture and protect information critical assets. The study stresses the importance of improving the local educational system to bridge the gap between supply and demand for cybersecurity specialists by implementing a structured approach that emphasizes behavior modification to get a high return on investment in cybersecurity awareness. 展开更多
关键词 DOWNSTREAM Cyberattack Cyber security Mitigate Decision-Makers Proac-tive Measure Critical assets Behavior Modification
下载PDF
“权利束”视角下数据资产的刑法保护 被引量:2
12
作者 姚万勤 赵小勇 《法治研究》 CSSCI 北大核心 2024年第1期88-100,共13页
数据的刑法保护不只是指保护个人数据、个人信息权利,还需要保护大数据产业链中处于处理、经营状态下的数据资产利益。在数据确权问题存在巨大争议的背景下,数据资产刑法法益的确定应“搁置确权争议”,遵循“权利束”确权逻辑及路径,承... 数据的刑法保护不只是指保护个人数据、个人信息权利,还需要保护大数据产业链中处于处理、经营状态下的数据资产利益。在数据确权问题存在巨大争议的背景下,数据资产刑法法益的确定应“搁置确权争议”,遵循“权利束”确权逻辑及路径,承认数据资产上存在“个人信息利益”“数据处理者、经营者经济财产利益”“社会公共秩序及国家安全利益”多元法益,这些法益的比例和形态在数据的采集、处理分析及交易交换等不同场景下有着阶段性的变化。构建数据资产刑法保护规范体系,应顺应保护数据经营利用价值的需求,对侵犯公民个人信息罪、非法经营罪、财产犯罪、知识产权犯罪及计算机信息系统犯罪进行解释性改造,以实现对数据资产中的个人信息利益、正当竞争利益、财产性利益、衍生数据知识产权利益及社会公共秩序等复杂法益的保护。 展开更多
关键词 数据资产 权利束 财产犯罪 衍生数据 数据安全
下载PDF
国有资产收益全民分享与共同养老金制度设计 被引量:1
13
作者 杨斌 黎涵 《厦门大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第2期121-129,共9页
落实以全民所有制为根基的社会主义制度,必须建立现实具体的国有资产收益全民分享机制,让全体人民分享归他们所有的国有资产收益。将部分国有资产收益用于建立共同养老金制度,平等地为达到一定年龄(依据国家一般退休年龄确定)的全体老... 落实以全民所有制为根基的社会主义制度,必须建立现实具体的国有资产收益全民分享机制,让全体人民分享归他们所有的国有资产收益。将部分国有资产收益用于建立共同养老金制度,平等地为达到一定年龄(依据国家一般退休年龄确定)的全体老年人发放一份社会主义性质的共同养老金,是社会主义初级阶段国有资产收益全民分享的可行方式。以国有资产收益建立的共同养老金制度具有国有企业产品消费倾向增长效应,不仅为老年人提供可持续、均等和稳定的基本生活保障,还能促进国有资产保值增值,保证其自身的可持续性。并且,与直接动用国有资本补充城镇职工基本养老保险相比,建立共同养老金制度能够有效缓解基本养老保险的给付差距问题。这为构建中国特色社会主义市场经济混合养老保障体系,即共同养老金和基本养老保险相辅相成的新型养老制度,提出新思路。 展开更多
关键词 国有资产收益全民分享 共同养老金 基本养老保险 混合养老保障体系
下载PDF
《民法典》动产与权利担保制度的商法属性解释论 被引量:1
14
作者 汪振江 贺中正 《南都学坛(南阳师范学院人文社会科学学报)》 2024年第1期78-88,共11页
《民法典》第388条对功能主义担保立法模式的引入,使动产和权利统一担保体系具有了较为鲜明的商法属性。但囿于民商合一的立法体例,其商事元素大多隐藏在民事规范之下,不得彰显。现行担保体系对商事担保的特殊性及商事交易实践需求不能... 《民法典》第388条对功能主义担保立法模式的引入,使动产和权利统一担保体系具有了较为鲜明的商法属性。但囿于民商合一的立法体例,其商事元素大多隐藏在民事规范之下,不得彰显。现行担保体系对商事担保的特殊性及商事交易实践需求不能及时作出回应,对商事交易实践造成影响。故而民商合一的立法体例需通过法律适用在实质上实现一般化一体规制,特殊化区分规制的立场。对此,商法视角的引入极为必要。商事担保以效益优先为价值理念,以功能主义为底层逻辑,在制度设计上具有更多的商事元素。利用区分原则,对担保体系中的民商事担保规范进行区分、整合,以形成担保体系“形式民商合一,实质统分结合”的体例。同时,商法思维的适用应兼顾商事规范的个性及民事规范的稳定,从而对动产和权利统一担保体系的商法属性作出回应,以期促进商事金融的发展创新。 展开更多
关键词 《民法典》 动产与权利担保 商事担保 商法属性
下载PDF
某三级甲等公立医院API接口安全监测实践与思考
15
作者 孙保峰 葛晓伟 +1 位作者 杨扬 李郁鸿 《中国数字医学》 2024年第7期115-120,共6页
目的:建立医院API接口资产台账,实现API接口的统一集中管理,并对API接口的运行状态进行实时监控,及时发现接口安全风险并整改,提升医院信息安全防护水平。方法:以某三级甲等公立医院为例,通过人工和系统识别相结合的方式,梳理医院API接... 目的:建立医院API接口资产台账,实现API接口的统一集中管理,并对API接口的运行状态进行实时监控,及时发现接口安全风险并整改,提升医院信息安全防护水平。方法:以某三级甲等公立医院为例,通过人工和系统识别相结合的方式,梳理医院API接口,建立台账,利用API接口监测设备对网络流量实时监测,识别安全风险并整改、加固。结果:实现了全院API接口的集中统一管理,提升了医院信息安全防护水平,保障医疗数据在信息系统间的安全共享和流通。结论:对API接口进行安全监测,有助于发现医疗机构应用系统安全风险,提升医疗机构网络安全防护能力,保障医疗数据安全。 展开更多
关键词 API接口 安全监测 资产梳理 API接口监测 风险处置
下载PDF
中国海洋高技术产业安全格局演变及预警分析
16
作者 王泽宇 宋洹 《中国海洋大学学报(社会科学版)》 2024年第5期26-39,共14页
基于新时期海洋高技术产业安全内涵,从“产业发展能力—产业创新能力—产业控制能力”三个维度构建海洋高技术产业安全评价指标体系,采用虚拟最劣解和灰色关联度动态评价模型测度中国沿海省份2009—2021年海洋高技术产业安全水平,分析... 基于新时期海洋高技术产业安全内涵,从“产业发展能力—产业创新能力—产业控制能力”三个维度构建海洋高技术产业安全评价指标体系,采用虚拟最劣解和灰色关联度动态评价模型测度中国沿海省份2009—2021年海洋高技术产业安全水平,分析产业安全格局演变过程,运用灰色BP神经网络模型预测2022—2035年海洋高技术产业安全指数。结果表明:(1)研究期海洋高技术产业安全水平整体较低,评价值在0.636~0.664之间波动;分维度看,海洋高技术产业控制能力下降约35.8%,产业发展能力和产业创新能力变化不大。(2)海洋高技术产业安全格局总体呈向好趋势,海南和广西从“风险”向“基本安全”转变;产业发展能力格局相对稳定;产业创新能力格局变化显著,“安全”和“基本安全”地区数量上升,“风险”地区数量降为零;产业控制能力格局呈反向变化趋势,海南、河北从“基本安全”向“风险”演变。(3)2022—2035年海洋高技术产业安全预警指数由0.678上升至0.826,警度等级下降,由“重警”变为“轻警”。 展开更多
关键词 海洋高技术产业安全 预警 灰色BP神经网络 格局演变
下载PDF
黄河流域城市群新型城镇化-生态安全-公共健康协调发展研究
17
作者 孙斌 杜松朴 +1 位作者 薛建春 姜慧敏 《资源开发与市场》 CAS 2024年第9期1298-1306,共9页
为改善黄河流域生态环境、加强黄河治理保护、促进沿黄地区高质量发展,选取2002-2021年黄河流域7个城市群60个地级市(州)的面板数据,运用熵权法、综合评价模型、耦合协调度模型和BP神经网络模型分析探讨了黄河流域7个城市群的新型城镇化... 为改善黄河流域生态环境、加强黄河治理保护、促进沿黄地区高质量发展,选取2002-2021年黄河流域7个城市群60个地级市(州)的面板数据,运用熵权法、综合评价模型、耦合协调度模型和BP神经网络模型分析探讨了黄河流域7个城市群的新型城镇化-生态安全-公共健康协调发展状况及其时空演化特征与未来发展趋势。结果表明:①2002-2021年黄河流域城市群新型城镇化、生态安全和公共健康子系统发展水平均有所提升;②新型城镇化-生态安全-公共健康系统耦合协调水平总体上呈现波动增长态势,在整体格局上,位于黄河流域中下游的山东半岛城市群和中原城市群系统发展水平较好,而其他城市群则较差;③预测2022-2026年黄河流域各城市群新型城镇化-生态安全-公共健康系统协调水平将整体显著提升。根据评估与预测结果,提出了相应的对策建议。 展开更多
关键词 新型城镇化—生态安全—公共健康 BP神经网络模型 耦合协调机制 黄河流域城市群
下载PDF
网络安全挂图作战实践
18
作者 胡威 张海霞 +2 位作者 夏昂 魏家辉 连一峰 《数据与计算发展前沿》 CSCD 2024年第1期125-135,共11页
【目的】随着当前网络空间与物理空间和社会空间逐步融合的趋势,重要行业部门在网络安全保护工作中积累了大量的网络安全数据,数据和业务驱动的网络安全挂图作战对掌握资产底数、改善数据治理成效、提升网络安全保护效能具有非常明显的... 【目的】随着当前网络空间与物理空间和社会空间逐步融合的趋势,重要行业部门在网络安全保护工作中积累了大量的网络安全数据,数据和业务驱动的网络安全挂图作战对掌握资产底数、改善数据治理成效、提升网络安全保护效能具有非常明显的作用,可全方位支撑网络安全保护和保障工作。【方法】本文以重要行业开展网络安全挂图作战能力建设为驱动,提出了包含要素抽取层、图谱设计层和智能认知层在内的整体技术架构,包括针对威胁情报信息的实体/关系抽取技术、针对网络资产的自动测绘技术、网络行为监测与建模技术、智能挖掘推理技术以及可视化表达技术等关键技术方法,并在电力行业某部门进行了实践应用。【结果】该技术框架可用于构建面向网络安全保护业务的网络空间地理图谱,支撑全方位、跨空间的网络安全监测发现、态势感知、事件处置和应急响应实战。【结论】基于网络安全地理图谱的挂图作战应用具有很好的应用价值和推广前景,能够直观展示跨空间的数据、要素和业务关系,但仍需要探索业务实战领域的新方法和新模型,以提升网络安全挂图的实战效能。 展开更多
关键词 网络空间安全 网络安全挂图 知识图谱 资产测绘技术
下载PDF
门限最优的椭圆曲线数字签名算法及其应用
19
作者 郭兆中 刘齐军 +1 位作者 尹海波 徐茂智 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2024年第8期1624-1631,共8页
针对当前椭圆曲线门限签名算法交互次数多和计算复杂度高的问题,本文提出一种高效的椭圆曲线数字签名门限最优签名算法。新增了预处理过程,各节点再通过费尔德曼可验证秘密分享和一阶同态加密算法生成一套基础数据,应用于签名阶段的乘... 针对当前椭圆曲线门限签名算法交互次数多和计算复杂度高的问题,本文提出一种高效的椭圆曲线数字签名门限最优签名算法。新增了预处理过程,各节点再通过费尔德曼可验证秘密分享和一阶同态加密算法生成一套基础数据,应用于签名阶段的乘法和求逆运算,完成多项式“降次”。算法实现门限最优的性质,整个算法仅需4轮即可完成签名。结果表明:随着门限值由4提升至20,算法能够在1.232~19.66 s完成签名的生成;增加预计算阶段后,计算的效率提升至0.667~4.559 s;在安全环境下,单次签名速度则可以达到毫秒级,能够有效应用于区块链账户安全保护和跨链资产锁定,具有实际应用价值。 展开更多
关键词 椭圆曲线密码 数字签名 门限签名 同态加密 安全多方计算 区块链 数字资产 跨链
下载PDF
基于DSMM标准的职业院校数据安全治理研究
20
作者 崔凤梅 张璠 《天津职业院校联合学报》 2024年第1期3-8,18,共7页
本文针对职业院校面临的数据安全问题,基于DSMM标准探索数据安全治理的路径,建立健全数据安全治理机制,提出在有效梳理数据资产的基础上,开展数据全生命周期的安全管理策略和技术防护措施,推进数据安全治理能力与职业院校信息化发展同... 本文针对职业院校面临的数据安全问题,基于DSMM标准探索数据安全治理的路径,建立健全数据安全治理机制,提出在有效梳理数据资产的基础上,开展数据全生命周期的安全管理策略和技术防护措施,推进数据安全治理能力与职业院校信息化发展同步建设。 展开更多
关键词 数据安全治理 DSMM标准 全生命周期 数据资产
下载PDF
上一页 1 2 42 下一页 到第
使用帮助 返回顶部