期刊文献+
共找到2,102篇文章
< 1 2 106 >
每页显示 20 50 100
The Analysis and Research Based on DEA Model and Super Efficiency DEA Model for Assessment of Classified Protection of Information Systems Security
1
作者 Jing Gao Yongiun Shen Guidong Zhang Qi Zhou 《计算机科学与技术汇刊(中英文版)》 2014年第4期140-145,共6页
关键词 安全等级保护 DEA模型 信息系统 评估模型 系统安全管理 决策单元 数据包络分析 DEA方法
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
2
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges Network information security protection status COUNTERMEASURES
下载PDF
Research on Network Security Level Protection Measurement Strategy in the Context of Cloud Platforms
3
作者 Lin Ma 《Journal of Electronic Research and Application》 2024年第3期221-229,共9页
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak... Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them. 展开更多
关键词 Cloud platform Cyber security level protection measurement
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
4
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 information warfare Proactive security Intrusion tolerant DSPS(Database security and protection system)
下载PDF
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
5
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
6
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical systems Critical Infrastructure Data protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
7
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 information security data privacy epidemic prevention and control personal privacy protection
下载PDF
A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
8
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Xin Liu Xiu-Bo Chen Yiying Yu Xiaojun Wang 《Computers, Materials & Continua》 SCIE EI 2022年第9期5429-5441,共13页
With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.Howe... With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search(PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further,the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly,we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result,which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least,through security analysis,our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others. 展开更多
关键词 Lattice cryptography searchable encryption blockchain privacy protection log system information security applied cryptography
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
9
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information protection Law Privacy security Privacy protection will
下载PDF
AssessITS: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
10
作者 Mir Mehedi Rahman Naresh Kshetri +1 位作者 Sayed Abu Sayeed Md Masud Rana 《Journal of Information Security》 2024年第4期564-588,共25页
In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an act... In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, “AssessITS” bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. “AssessITS” aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards. 展开更多
关键词 CYBERsecurity information security Risk Assessment Risk Evaluation Risk Mitigation Threat level Vulnerability Assessment
下载PDF
Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix 被引量:2
11
作者 Junjia Chen Wei Lu +4 位作者 Yuileong Yeung Yingjie Xue Xianjin Liu Cong Lin Yue Zhang 《Computers, Materials & Continua》 SCIE EI 2018年第5期201-211,共11页
In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security.In most state-of-the-art binary image steganographic s... In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security.In most state-of-the-art binary image steganographic schemes,they always find out the flippable pixels to minimize the embedding distortions.For this reason,the stego images generated by the previous schemes maintain visual quality and it is hard for steganalyzer to capture the embedding trace in spacial domain.However,the distortion maps can be calculated for cover and stego images and the difference between them is significant.In this paper,a novel binary image steganalytic scheme is proposed,which is based on distortion level co-occurrence matrix.The proposed scheme first generates the corresponding distortion maps for cover and stego images.Then the co-occurrence matrix is constructed on the distortion level maps to represent the features of cover and stego images.Finally,support vector machine,based on the gaussian kernel,is used to classify the features.Compared with the prior steganalytic methods,experimental results demonstrate that the proposed scheme can effectively detect stego images. 展开更多
关键词 Binary image steganalysis informational security embedding distortion distortion level map co-occurrence matrix support vector machine.
下载PDF
Techniques for Hiding Mobile Node's Location Movement Information in Mobile IP
12
作者 Robert H.DENG 《China Communications》 SCIE CSCD 2007年第1期85-94,共10页
Mobile IP is an IP layer mobility protocol which allows mobile nodes to remain reachable while moving around in the Internet.In the current IETF Mobile IP specifications,when a mobile node roams, its location movement... Mobile IP is an IP layer mobility protocol which allows mobile nodes to remain reachable while moving around in the Internet.In the current IETF Mobile IP specifications,when a mobile node roams, its location movement can be tracked by simply monitoring the IP addresses in IP packets.Recently, the issue of protecting location information in Mobile IP has received increasing attention,especially within the IETF and the 3GPP standard bodies.In this paper we propose a technique for hiding a mobile node’s location movement information from eavesdroppers during route optimization and as well as from its correspondent node during reverse tunneling. The proposed technique is highly efficient and fully compatible with the base Mobile IPv6 operation. 展开更多
关键词 security pricacy protection LOCATION information MOBILE IP
下载PDF
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
13
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第2期77-81,共5页
This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmeti... This paper considers a decomposition framework as a mechanism for information hiding for secure communication via open network channels. Two varieties of this framework are provided: one is based on Gaussian arithmetic with complex modulus and another on an elliptic curve modular equation. The proposed algorithm is illustrated in a numerical example. 展开更多
关键词 Complex MODULUS Cryptanalytic protection DECOMPOSITION GAUSSIAN MODULAR ARITHMETIC information Hiding Key Exchange MODULAR ELLIPTIC Curve Secure Communication
下载PDF
基于区块链的农产品供应链溯源研究综述 被引量:1
14
作者 胡祥培 都牧 +2 位作者 孔祥维 朱姗 张源凯 《管理科学学报》 CSSCI CSCD 北大核心 2024年第5期1-12,共12页
中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块... 中国的农产品供应链是一个多利益主体共同参与、多阶段多链路、动态可扩展网链的人机复合系统,使得基于区块链的农产品供应链溯源系统面临着链上信息泄露和溯源信息造假的管理实践挑战.本研究结合我国农产品供应链特点,从建设基于区块链的农产品供应链溯源系统的实际需求以及应用实践出发,对区块链技术及应用、区块链中的隐私保护与农产品信息安全、信任传递与融合方法这三个方面对国内外相关研究进行综述,并据此提出我国建设这类溯源系统的两个核心难题--“如何建”和“如何查”.针对这两个难题,从管理科学视角各提出四类关键科学问题,展望未来研究的发展趋势,并从应用实践层面提出基于区块链的农产品供应链溯源系统的发展建议. 展开更多
关键词 农产品供应链 区块链 质量追溯 隐私保护与信息安全 信任传递与融合
下载PDF
跨层次视角下信息安全氛围对员工信息安全制度遵守意愿的影响作用
15
作者 李文琴 刘荣敏 +1 位作者 孙林辉 高杰 《科学技术与工程》 北大核心 2024年第8期3479-3487,共9页
员工安全遵守行为已成为保护企业信息资产安全的重要保障。侧重人因因素,讨论如何通过有效方法来规范和引导员工遵守信息安全制度。基于保护动机理论(protection motivation theory,PMT)和社会认知理论,采用跨层次分析方法,以员工信息... 员工安全遵守行为已成为保护企业信息资产安全的重要保障。侧重人因因素,讨论如何通过有效方法来规范和引导员工遵守信息安全制度。基于保护动机理论(protection motivation theory,PMT)和社会认知理论,采用跨层次分析方法,以员工信息安全制度遵守意愿为因变量,信息安全氛围为组织层面变量,感知严重性、感知易感性、反应效能和自我效能为个体层面变量构建研究模型。借鉴成熟量表设计问卷,发放问卷并获取有效数据,应用SPSS 26.0软件对研究模型进行假设验证。实证结果表明:感知严重性、感知易感性、反应效能和自我效能均正向影响员工信息安全制度遵守意愿;信息安全氛围跨层次既能直接影响员工信息安全制度遵守意愿,又可通过个体层面变量对结果变量产生影响作用。为强化企业安全管理提供一定的理论支撑。 展开更多
关键词 信息安全氛围 保护动机理论(PMT) 跨层次分析 信息安全制度遵守意愿
下载PDF
智慧校园一卡通系统安全防护策略 被引量:2
16
作者 王利巧 买若毅 《办公自动化》 2024年第6期25-28,共4页
高校一卡通系统作为智慧校园信息化建设的重要领域,为院校的教学、管理和师生生活保驾护航。随着智慧校园一卡通系统功能的复杂化和多样化,其安全问题也日益突出,文章针对智慧校园一卡通系统应用过程中所面临的典型的信息安全问题,从校... 高校一卡通系统作为智慧校园信息化建设的重要领域,为院校的教学、管理和师生生活保驾护航。随着智慧校园一卡通系统功能的复杂化和多样化,其安全问题也日益突出,文章针对智慧校园一卡通系统应用过程中所面临的典型的信息安全问题,从校园卡结构、终端安全、数据存储安全、数据传输安全、数据库安全等几个方面构建相应的安全策略,为高校智慧校园一卡通信息系统的安全建设和管理提供理论借鉴。 展开更多
关键词 智慧校园 一卡通系统 信息安全 防护策略
下载PDF
大数据背景下西藏网络信息安全对策
17
作者 石方夏 高屹 《西藏发展论坛》 2024年第6期82-88,共7页
西藏的网络信息安全关系到全面贯彻新时代党的治藏方略,建设团结富裕文明和谐美丽的社会主义现代化新西藏总体目标的实现;也关系到边防巩固和边境安全以及国家安全和长治久安。文章介绍了大数据的产生、特征和社会价值,在此基础上,探讨... 西藏的网络信息安全关系到全面贯彻新时代党的治藏方略,建设团结富裕文明和谐美丽的社会主义现代化新西藏总体目标的实现;也关系到边防巩固和边境安全以及国家安全和长治久安。文章介绍了大数据的产生、特征和社会价值,在此基础上,探讨了大数据背景下西藏网络信息基础设施建设状况和网络信息状况,分析了当前西藏网络信息安全存在的问题和原因。最后,结合西藏的实际情况,对解决当前西藏网络信息安全问题提出了对策。 展开更多
关键词 大数据 信息 网络 安全 等级保护
下载PDF
基于等级保护2.0的高校校园网安全平台设计
18
作者 夏龄 周德荣 《四川职业技术学院学报》 2024年第2期145-148,162,共5页
文章分析了我国高校当前面临的网络安全形势,从落实网络安全等级保护视角,以四川民族学院校园网安全为研究对象,基于等级保护2.0标准,从管理和技术两个维度对高校校园网安全平台设计,构建安全合规、具有前瞻性技术理念的网络安全平台,... 文章分析了我国高校当前面临的网络安全形势,从落实网络安全等级保护视角,以四川民族学院校园网安全为研究对象,基于等级保护2.0标准,从管理和技术两个维度对高校校园网安全平台设计,构建安全合规、具有前瞻性技术理念的网络安全平台,最后对基于等级保护2.0高校校园网安全平台的目标和实现进行了深入探讨. 展开更多
关键词 安全形势 等级保护2.0 安全平台 设计实现
下载PDF
高职院校校园网信息安全防护策略探讨
19
作者 何超 《辽宁高职学报》 2024年第9期105-108,共4页
随着信息技术的不断进步和高职院校数字化校园的建设,校园网已成为高职院校学习、研究、管理的重要平台。但伴随校园网络带来的便捷,高职院校也面临着严峻的信息安全挑战。针对目前高职院校校园网信息安全的现状和存在的问题,探讨适合... 随着信息技术的不断进步和高职院校数字化校园的建设,校园网已成为高职院校学习、研究、管理的重要平台。但伴随校园网络带来的便捷,高职院校也面临着严峻的信息安全挑战。针对目前高职院校校园网信息安全的现状和存在的问题,探讨适合高职院校的信息安全防护策略,建立起一套全面、有效的信息安全防护体系,以确保校园网的安全运行和教学资料的保密性、完整性与可用性。 展开更多
关键词 高职院校 校园网 信息安全 防护 策略
下载PDF
环境问责风险与重污染企业审计费用——基于中央生态环境保护督察的准自然实验研究
20
作者 郭雪萌 马佳欣 《审计研究》 CSSCI 北大核心 2024年第3期113-124,共12页
本文以2008-2017年我国A股上市制造业企业为样本,以中央生态环境保护督察组进驻为准自然实验,以重污染制造业企业为实验组、非重污染制造业企业为对照组,构建多期双重差分模型,检验环境问责制对重污染企业审计费用的影响。研究发现,环... 本文以2008-2017年我国A股上市制造业企业为样本,以中央生态环境保护督察组进驻为准自然实验,以重污染制造业企业为实验组、非重污染制造业企业为对照组,构建多期双重差分模型,检验环境问责制对重污染企业审计费用的影响。研究发现,环境问责制显著降低重污染企业的审计费用;机制检验发现,环境问责制通过提升重污染企业绿色治理水平、会计信息质量和管理层语调可靠度,来降低重污染企业审计费用;异质性检验发现,在政企关联强、风险承担水平低、地区公众环境关注高的企业,环境问责制对重污染企业审计费用的影响更显著。本研究拓展了中央生态环境保护督察的微观后果,为规范环境风险挑战下重污染企业的审计定价、优化环境规制体系提供理论与决策依据。 展开更多
关键词 中央生态环境保护督察 审计费用 绿色治理水平 会计信息质量 管理层语调操纵
下载PDF
上一页 1 2 106 下一页 到第
使用帮助 返回顶部