期刊文献+
共找到328篇文章
< 1 2 17 >
每页显示 20 50 100
SDSA: A Framework of a Software-Defi ned Security Architecture 被引量:3
1
作者 LIU Yanbing LU Xingyu +1 位作者 JIAN Yi XIAO Yunpeng 《China Communications》 SCIE CSCD 2016年第2期178-188,共11页
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems. 展开更多
关键词 information security networksecurity security architecture software-definedsecurity
下载PDF
Study of An Integrated Security Solution for Network Information System
2
作者 Yangqing Zhu 《通讯和计算机(中英文版)》 2006年第3期35-39,56,共6页
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information security Network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security architecture
下载PDF
On a Generic Security Game Model
4
作者 Vivek Shandilya Sajjan Shiva 《International Journal of Communications, Network and System Sciences》 2017年第7期142-172,共31页
To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users,... To protect the systems exposed to the Internet against attacks, a security system with the capability to engage with the attacker is needed. There have been attempts to model the engagement/interactions between users, both benign and malicious, and network administrators as games. Building on such works, we present a game model which is generic enough to capture various modes of such interactions. The model facilitates stochastic games with imperfect information. The information is imperfect due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over other multiple states, we use Euclidean distances between the outputs of the sensors. We build a 5-state game to represent the interaction of the administrator with the user. The states correspond to 1) the user being out of the system in the Internet, and after logging in to the system;2) having low privileges;3) having high privileges;4) when he successfully attacks and 5) gets trapped in a honeypot by the administrator. Each state has its own action set. We present the game with a distinct perceived action set corresponding to each distinct information set of these states. The model facilitates stochastic games with imperfect information. The imperfect information is due to erroneous sensors leading to incorrect perception of the current state by the players. To model this error in perception distributed over the states, we use Euclidean distances between outputs of the sensors. A numerical simulation of an example game is presented to show the evaluation of rewards to the players and the preferred strategies. We also present the conditions for formulating the strategies when dealing with more than one attacker and making collaborations. 展开更多
关键词 security system architecture STOCHASTIC GAME General SUM GAME Imperfect information NUMERICAL Simulation
下载PDF
Human Sensor Web Crowd Sourcing Security Incidents Management in Tanzania Context
5
作者 Maduhu Mshangi Edephonce Ngemera Nfuka Camilius Sanga 《Journal of Information Security》 2018年第3期191-208,共18页
Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address th... Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address the problematic situation of security incidents. The study proposes a human sensor web Crowd sourcing platform for reporting, searching, querying, analyzing, visualizing and responding to security incidents as they arise in real time. Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. It employs outsourcing collaborative efforts initiatives outside the boundaries of the given organization in solving a problematic situation such as how to improve the security of information systems. It was managed by soft systems methodology. Moreover, security maturity level assessment was carried out to determine security requirements for managing security incidents using ISO/IEC 21827: Systems security engineering capability maturity model with a rating scale of 0 - 5. It employed descriptive statistics and non-parametric statistical method to determine the significance of each variable based on a research problem. It used Chi-Square Goodness of Fit Test (X2) to determine the statistical significance of result findings. The findings revealed that security controls and security measures are implemented in ad-hoc. For managing security incidents, organizations should use human sensor web Crowd sourcing platform. The study contributes to knowledge base management learning integration: practical implementation of Crowd sourcing in information systems security. 展开更多
关键词 HUMAN Sensor Web Crowd SOURCING GEOGRAPHICAL information system security Incidents system architecture
下载PDF
SOA Information Engineering System Based on Knowledge Grid Applications in Smart Grids
6
作者 Wang Jingmin Dong Bo 《Electricity》 2012年第4期16-19,共4页
Smart grids have the characteristics of being observable,controllable,adaptive,self-healing,embedded independent processing,and real-time analysis.With the development of smart grids,constructing a grid to cover globa... Smart grids have the characteristics of being observable,controllable,adaptive,self-healing,embedded independent processing,and real-time analysis.With the development of smart grids,constructing a grid to cover global,unified information systems,which should be adapted to fulf ill the requirements of the characteristics,is essential.This paper presents an service-oriented architecture(SOA)for smart grid information-engineering systems based on knowledge grid,which could form as a service-oriented architecture through business,technology and management;it would extract potentially valuable information from the massive amount of information on the generation side,the grid side,and the electricity side,then share the useful information to improve availability,security and stability. 展开更多
关键词 knowledge grid smart grid service-oriented architecture (SOA) information security
下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
7
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
下载PDF
Advancing Deepfake Detection Using Xception Architecture:A Robust Approach for Safeguarding against Fabricated News on Social Media
8
作者 Dunya Ahmed Alkurdi Mesut Cevik Abdurrahim Akgundogdu 《Computers, Materials & Continua》 SCIE EI 2024年第12期4285-4305,共21页
Deepfake has emerged as an obstinate challenge in a world dominated by light.Here,the authors introduce a new deepfake detection method based on Xception architecture.The model is tested exhaustively with millions of ... Deepfake has emerged as an obstinate challenge in a world dominated by light.Here,the authors introduce a new deepfake detection method based on Xception architecture.The model is tested exhaustively with millions of frames and diverse video clips;accuracy levels as high as 99.65%are reported.These are the main reasons for such high efficacy:superior feature extraction capabilities and stable training mechanisms,such as early stopping,characterizing the Xception model.The methodology applied is also more advanced when it comes to data preprocessing steps,making use of state-of-the-art techniques applied to ensure constant performance.With an ever-rising threat from fake media,this piece of research puts great emphasis on stringent memory testing to keep at bay the spread of manipulated content.It also justifies better explanation methods to justify the reasoning done by the model for those decisions that build more trust and reliability.The ensemble models being more accurate have been studied and examined for establishing a possibility of combining various detection frameworks that could together produce superior results.Further,the study underlines the need for real-time detection tools that can be effective on different social media sites and digital environments.Ethics,protecting privacy,and public awareness in the fight against the proliferation of deepfakes are important considerations.By significantly contributing to the advancements made in the technology that has actually advanced detection,it strengthens the safety and integrity of the cyber world with a robust defense against ever-evolving deepfake threats in technology.Overall,the findings generally go a long way to prove themselves as the crucial step forward to ensuring information authenticity and the trustworthiness of society in this digital world. 展开更多
关键词 Deepfake Detection Xception architecture data processing image processing intelligent information systems social media security
下载PDF
On the architecture and development life cycle of secure cyber-physical systems
9
作者 SUN Cong MA Jianfeng YAO Qingsong 《Journal of Communications and Information Networks》 2016年第4期1-21,共21页
Cyber-physical systems are being confronted with an ever-increasing number of security threats from the complicated interactions and fusions between cyberspace and physical space.Integrating security-related activitie... Cyber-physical systems are being confronted with an ever-increasing number of security threats from the complicated interactions and fusions between cyberspace and physical space.Integrating security-related activities into the early phases of the development life cycle is a monolithic and cost-effective solution for the development of security-critical cyber-physical systems.These activities often incorporate security mechanisms from different realms.We present a fine-grained design flow paradigm for security-critical and software-intensive cyber-physical systems.We provide a comprehensive survey on the domain-specific architectures,countermeasure techniques and security standards involved in the development life cycle of security-critical cyber-physical systems,and adapt these elements to the newly designed flow paradigm.Finally,we provide prospectives and future directions for improving the usability and security level of this design flow paradigm. 展开更多
关键词 cyber-physical system development life cycle security architecture security standard assessment SYNTHESIS VERIFICATION
原文传递
基于混合云架构的分布式协同信息共享平台设计 被引量:1
10
作者 韩泽华 董爱强 +2 位作者 郭晓娟 张立新 崔粉霞 《电气自动化》 2024年第2期83-87,共5页
随着云环境的日趋复杂和信息分享需求的日益增大,设计了一种基于混合云架构的分布式协同信息共享平台。设计公、私有云混合环境下的信息共享平台的各项功能,通过定义共享平台数据的敏感度、空间饱和度以及访问频率等参数,为数据选择合... 随着云环境的日趋复杂和信息分享需求的日益增大,设计了一种基于混合云架构的分布式协同信息共享平台。设计公、私有云混合环境下的信息共享平台的各项功能,通过定义共享平台数据的敏感度、空间饱和度以及访问频率等参数,为数据选择合适的存储位置;采用新型数据命名规则,将不同数据命名为一级数据或多级数据,从而实现共享数据的高效分发;还设计一种改进型公私钥双重加密技术,保护共享平台的数据安全,通过建立加密秘钥、权限矩阵和服务器密文三种加密数据,并与云共享平台再度结合产生重加密密文,实现指定用户的指定数据安全共享。经过试验验证,设计的分布式协同信息共享平台在数据存储、数据传输与数据安全方面均有较高的性能。 展开更多
关键词 数据存储 数据命名 分布式 混合云架构 数据安全 信息共享平台
下载PDF
民航领域数据要素流通与安全治理实践及展望
11
作者 刘艳芳 张磊 李韩萱 《大数据》 2024年第6期149-160,共12页
数据要素流通是数字经济发展的关键,安全先行是建设数据要素市场的原则。阐述了民航领域数据资源特征和数据流通现状,以及多主体参与面临的安全挑战。从企业内数据治理、行业内数据流通、跨行业数据流通3个层面,提出了3层递进模型。以... 数据要素流通是数字经济发展的关键,安全先行是建设数据要素市场的原则。阐述了民航领域数据资源特征和数据流通现状,以及多主体参与面临的安全挑战。从企业内数据治理、行业内数据流通、跨行业数据流通3个层面,提出了3层递进模型。以中国民航信息网络股份有限公司的数据治理实践为例,介绍了数据架构治理、数据标准实施、分类分级安全管控和全生命周期安全防护体系。最后,对民航领域数据要素流通与安全治理进行了展望。 展开更多
关键词 数据要素流通 数据安全治理 数据标准 数据架构 分类分级
下载PDF
基于网络安全等级保护2.0的测评管理系统设计与实现 被引量:2
12
作者 汪晨旭 姜来为 +3 位作者 李婧涵 郭星宇 王文浩 夏渝彧 《科技创新与应用》 2024年第6期28-33,37,共7页
在传统的信息安全等级保护测评过程中,当测评人员完成测评工作后,由于人员水平参差,形成的最终报告往往差别较大。为了规范测评结果报告的生成,并方便测评人员对测评结果进行管理,该文基于网络安全等级保护2.0(等保2.0)国家标准要求,设... 在传统的信息安全等级保护测评过程中,当测评人员完成测评工作后,由于人员水平参差,形成的最终报告往往差别较大。为了规范测评结果报告的生成,并方便测评人员对测评结果进行管理,该文基于网络安全等级保护2.0(等保2.0)国家标准要求,设计并实现信息安全等级保护测评管理系统。本系统具有创新性的多方参与管理体系,将用户根据身份的不同划分成不同的角色,不同身份级别的角色对系统中的测评结果拥有不同的查看或修改权限。系统基于B/S架构与MVC框架,利用PHP语言开发,并采用HTML、CSS、JavaScript等前端技术实现系统的可视化、动态化。 展开更多
关键词 信息安全 等保2.0 测评管理系统 B/S架构 通信技术
下载PDF
高等教育数字化转型的逻辑框架和信息化体系研究
13
作者 陈泽生 周敏 冯李春 《中国教育信息化》 2024年第9期50-59,共10页
随着新一轮科技革命和产业革命的深入发展,数字化转型已成为全球教育界的共识。当前,我国的高等教育数字化转型正处于发展萌芽阶段,数字化转型的整体逻辑框架尚不清晰,如何部署和建设高等教育机构的信息化体系成为高校亟需思考的问题。... 随着新一轮科技革命和产业革命的深入发展,数字化转型已成为全球教育界的共识。当前,我国的高等教育数字化转型正处于发展萌芽阶段,数字化转型的整体逻辑框架尚不清晰,如何部署和建设高等教育机构的信息化体系成为高校亟需思考的问题。基于此,研究者提出一种教育数字化转型的逻辑框架,包含驱动因素、技术和方法、目的三个主体元素。首先将受教育者的需求、社会的需求、教育变革和信息技术提供的可能性列为驱动因素;其次将技术和方法作为逻辑框架的主体,分别从政府、企业、学校、教师的角度,对技术和方法展开描述;最后从微观到宏观描述了数字化转型的目的。同时提出构建数字化转型的信息化体系,重点描述信息技术在高等教育机构数字化转型过程中的作用和建设思路,为教育领域的数字化转型建设方案提供了思考和借鉴。 展开更多
关键词 高等教育 数字化转型 信息化体系 数据治理 网络安全
下载PDF
药物警戒信息系统在制药企业中的应用 被引量:1
14
作者 潘宏健 郑萌 《移动信息》 2024年第3期220-222,共3页
随着医药科技的快速发展,药物警戒系统在制药企业中扮演着越来越关键的角色。文中深入探讨了药物警戒信息系统在制药行业中的应用,重点分析了系统的架构设计、数据处理能力以及在实际药物监控中的应用效果。通过对现有制药企业药物警戒... 随着医药科技的快速发展,药物警戒系统在制药企业中扮演着越来越关键的角色。文中深入探讨了药物警戒信息系统在制药行业中的应用,重点分析了系统的架构设计、数据处理能力以及在实际药物监控中的应用效果。通过对现有制药企业药物警戒系统的研究,揭示了系统集成、数据安全性、药物不良反应监测的最佳实践。此外,文中还通过案例研究,展示了如何有效实施这些系统,并讨论了在实际应用中遇到的主要挑战和解决策略。该研究不仅为制药企业提供了药物警戒信息系统的实施指导,也为药品安全监管提供了一定的参考。 展开更多
关键词 药物警戒 信息系统 制药企业 系统架构 数据安全
下载PDF
国网用电信息采集系统2.0终端技术架构方案研究
15
作者 许伟 陈孟 阿布都吉利力·艾海提 《科技资讯》 2024年第13期53-55,共3页
国网用电信息采集系统2.0终端技术架构方案涉及全面的系统需求分析、总体架构设计,包括硬件和软件两大部分。硬件设计关注电源、数据采集、处理及人机交互等模块;而软件设计则侧重开发环境配置、层次结构、功能模块划分及流程与界面设... 国网用电信息采集系统2.0终端技术架构方案涉及全面的系统需求分析、总体架构设计,包括硬件和软件两大部分。硬件设计关注电源、数据采集、处理及人机交互等模块;而软件设计则侧重开发环境配置、层次结构、功能模块划分及流程与界面设计。整个系统强调接口的标准化与安全性设计,以保障系统的高效稳定运行,并满足未来电力市场的需求。 展开更多
关键词 用电信息采集系统 终端技术架构 硬件设计 软件设计 安全设计
下载PDF
智慧体育场馆的信息安全:云原生架构的防护策略
16
作者 李岳存 刘方园 王洪亮 《现代建筑电气》 2024年第11期27-32,共6页
我国一些智慧体育场馆在建设过程中面临着如何将云原生架构与信息安全深度融合的问题。概述了研究的背景和意义,介绍了相关政策和标准,并阐述了基于云的智慧体育场馆架构。随后,深入分析了云原生架构及其安全需求,讨论了传统安全架构的... 我国一些智慧体育场馆在建设过程中面临着如何将云原生架构与信息安全深度融合的问题。概述了研究的背景和意义,介绍了相关政策和标准,并阐述了基于云的智慧体育场馆架构。随后,深入分析了云原生架构及其安全需求,讨论了传统安全架构的建设策略,并进一步探讨了如何构建云原生安全体系。通过实际案例的安全性对比与效益分析,展示了云原生安全架构的优势。最后,结合实际案例介绍了云原生安全技术的应用,并展望了智慧体育场馆未来的发展方向。结果旨在为智慧体育场馆的安全建设和管理提供技术指导和安全保障,推动体育场馆在智能安全方向的升级。 展开更多
关键词 智慧体育场馆 云原生架构 信息安全 云原生安全 安全防护策略
下载PDF
基于SSL双向认证技术的安全服务系统分析
17
作者 徐凯 于俊 +2 位作者 肖菲 罗贵军 徐传友 《集成电路应用》 2024年第7期92-93,共2页
阐述一种安全服务系统的设计,使用SSL证书和私钥进行双向认证,确保用户和服务器之间通信的安全性。系统提供安全的数据传输和存储功能,通过加密和解密算法来保护用户的数据隐私。
关键词 SSL双向认证 信息安全服务 系统架构设计
下载PDF
新一代电力信息网络安全架构的思考 被引量:112
18
作者 王栋 陈传鹏 +2 位作者 颜佳 郭靓 来风刚 《电力系统自动化》 EI CSCD 北大核心 2016年第2期6-11,共6页
能源互联网的崛起正在迅速改变电力信息网络系统架构,电力信息网络面临着一系列新的安全挑战。以满足未来更高级别安全能力为出发点,秉承继承创新、自主可控、协同对抗、智能防护的原则,设计了一种适应新一代电力信息网络的安全架构模型... 能源互联网的崛起正在迅速改变电力信息网络系统架构,电力信息网络面临着一系列新的安全挑战。以满足未来更高级别安全能力为出发点,秉承继承创新、自主可控、协同对抗、智能防护的原则,设计了一种适应新一代电力信息网络的安全架构模型,并提出了架构的构建措施。新一代电力信息网络安全架构模型提出了全新的九大安全需求,融合管理、策略、技术与角色四个维度于一体,构建了涵盖研发、测试、运行三平台并以分级防护、事件感知、预警调度、应急响应、灾难恢复和攻防对抗六环节为主体的闭环技术体系,以实现对信息安全全生命周期的可持续管控。在新一代电力信息网络安全架构建设过程中,需要统一开展信息安全顶层设计,打造高水平信息安全专业队伍,融合构建新型信息安全技防体系,以强化对风险、威胁和脆弱性的智能预警和防范能力,从而全面建成新一代信息网络安全防护体系,提升电力行业信息安全整体保障能力。 展开更多
关键词 电力信息安全 新一代安全 安全模型 安全架构 安全能力
下载PDF
天地一体化信息网络安全保障技术研究进展及发展趋势 被引量:98
19
作者 李凤华 殷丽华 +2 位作者 吴巍 张林杰 史国振 《通信学报》 EI CSCD 北大核心 2016年第11期156-168,共13页
天地一体化信息网络由天基骨干网、天基接入网、地基节点网、地面互联网、移动通信网等多种异构网络互联融合而成,对实现国家安全战略目标具有重要意义。首先,介绍了天地一体化信息网络架构,以及卫星节点暴露、信道开放、异构网络互连... 天地一体化信息网络由天基骨干网、天基接入网、地基节点网、地面互联网、移动通信网等多种异构网络互联融合而成,对实现国家安全战略目标具有重要意义。首先,介绍了天地一体化信息网络架构,以及卫星节点暴露、信道开放、异构网络互连等特征,并从物理层、运行层、数据层3个层面分析了天地一体化信息网络面临的威胁;其次,从物理安全、运行安全、数据安全3个层面对抗损毁、抗干扰、安全接入、安全路由、安全切换、安全传输、密钥管理等安全保障技术的研究现状进行了阐述;最后,针对天地一体化信息网络特点和安全保障需求,指出了天地一体化信息网络安全保障技术发展趋势和研究方向。 展开更多
关键词 天地一体化信息网络 威胁 安全保障 安全架构
下载PDF
电力行业信息安全体系结构初探 被引量:17
20
作者 李文武 王先培 +1 位作者 孟波 贺鹏 《中国电力》 CSCD 北大核心 2002年第5期76-79,共4页
电力行业信息系统对电力系统的安全、稳定、经济运行起着重要作用。随着互联网飞速发展,网络攻击日渐增多,给电力系统又增加了新的隐患。文中介绍电力行业信息化建设的现状、发展趋势及带来的安全问题,将电力信息依安全性分级,以PKI为... 电力行业信息系统对电力系统的安全、稳定、经济运行起着重要作用。随着互联网飞速发展,网络攻击日渐增多,给电力系统又增加了新的隐患。文中介绍电力行业信息化建设的现状、发展趋势及带来的安全问题,将电力信息依安全性分级,以PKI为基础提出了三维行业安全体系结构,并指出实施中应解决的一些问题。 展开更多
关键词 电力行业 信息安全 体系结构 电力系统 计算机
下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部