期刊文献+
共找到2,493篇文章
< 1 2 125 >
每页显示 20 50 100
Integration of urban and rural minimum living standard security system
1
作者 Feng Shuai Wei Gege 《International English Education Research》 2015年第6期86-88,共3页
With the acceleration of urbanization, the lifestyles and living expenses of farmers and urban residents is increasingly more and more similar .However, from the measures in terms of the minimum living guarantee, the ... With the acceleration of urbanization, the lifestyles and living expenses of farmers and urban residents is increasingly more and more similar .However, from the measures in terms of the minimum living guarantee, the level of protection of rural and urban residents really have a large gap. The Third Plenary Session of the 18th Central Committee noted "to promote urban and rural minimum living security system and rural development", "to speed up and improve the social security management system and operate the service system",These tell us that only to realize the integration of urban and rural subsistence allowances, improve the underpinning of the social security system, can we build a moderately prosperous society. 展开更多
关键词 integration Urban and rural security system
下载PDF
A Study on the Restricted Factors of the Integration of Urban and Rural Low- security in China
2
作者 HUO Yingchun LV Jing 《International English Education Research》 2017年第2期42-44,共3页
With the deepening of the national urban and rural development strategy and the development of urban and rural integration, all levels of government are committed to narrowing the gap between rural and urban subsisten... With the deepening of the national urban and rural development strategy and the development of urban and rural integration, all levels of government are committed to narrowing the gap between rural and urban subsistence allowances. However, the inherent urban and rural differences and path dependence determines the integration of urban and rural low-cost integration is far from the standard can be achieved, the institutional environment and the operating environment are not in the same starting line of the facts, determines the "integration" will need to go through a long period of time Time of urban and rural development can be gradually achieved. At present, China's widespread implementation of the distinction between urban and rural residents minimum riving security system, not only difficult to play its due security ftmction, but further exacerbated the vicious cycle of dual society, the economic and social development is extremely unfavorable. 展开更多
关键词 minimum living security integration CONSTRAINTS
下载PDF
Ensuring water security by utilizing roof-harvested rainwater and lake water treated with a low-cost integrated adsorption-filtration system 被引量:2
3
作者 Riffat Shaheed Wan Hanna Melini Wan Mohtar Ahmed El-Shafie 《Water Science and Engineering》 EI CAS CSCD 2017年第2期115-124,共10页
Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined acti... Drinking water is supplied through a centralized water supply system and may not be accessed by communities in rural areas of Malaysia.This study investigated the performance of a low-cost, self-prepared combined activated carbon and sand filtration(CACSF) system for roofharvested rainwater and lake water for potable use. Activated carbon was self-prepared using locally sourced coconut shell and was activated using commonly available salt rather than a high-tech procedure that requires a chemical reagent. The filtration chamber was comprised of local,readily available sand. The experiments were conducted with varying antecedent dry intervals(ADIs) of up to 15 d and lake water with varying initial chemical oxygen demand(COD) concentration. The CACSF system managed to produce effluents complying with the drinking water standards for the parameters p H, dissolved oxygen(DO), biochemical oxygen demand(BOD5), COD, total suspended solids(TSS), and ammonia nitrogen(NH_3-N). The CACSF system successfully decreased the population of Escherichia coli(E. coli) in the influents to less than 30 CFU/m L. Samples with a higher population of E. coli(that is, greater than 30 CFU/m L) did not show 100% removal. The system also showed high potential as an alternative for treated drinking water for roof-harvested rainwater and class II lake water. 展开更多
关键词 LOW-COST activated carbon INTEGRATED adsorption-sand filtration Roof-harvested RAINWATER Lake WATER WATER security
下载PDF
Study on Security of 5G and Satellite Converged Communication Network 被引量:6
4
作者 YAN Xincheng TENG Huiyun +2 位作者 PING Li JIANG Zhihong ZHOU Na 《ZTE Communications》 2021年第4期79-89,共11页
The 5G and satellite converged communication network(5G SCCN)is an impor⁃tant component of the integration of satellite-terrestrial networks,the national science,and technology major projects towards 2030.Security is ... The 5G and satellite converged communication network(5G SCCN)is an impor⁃tant component of the integration of satellite-terrestrial networks,the national science,and technology major projects towards 2030.Security is the key to ensuring its operation,but at present,the research in this area has just started in our country.Based on the network char⁃acteristics and security risks,we propose the security architecture of the 5G SCCN and sys⁃tematically sort out the key protection technologies and improvement directions.In particu⁃lar,unique thinking on the security of lightweight data communication and design reference for the 5G SCCN network architecture is presented.It is expected to provide a piece of refer⁃ence for the follow-up 5G SCCN security technology research,standard evolution,and indus⁃trialization. 展开更多
关键词 5G SCCN non-terrestrial networks 5G security satellite security integration of satellite-terrestrial networks
下载PDF
Security Threat and Vulnerability Assessment and Measurement in Secure Software Development 被引量:1
5
作者 Mamoona Humayun NZ Jhanjhi +1 位作者 Maram Fahhad Almufareh Muhammad Ibrahim Khalil 《Computers, Materials & Continua》 SCIE EI 2022年第6期5039-5059,共21页
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).T... Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications. 展开更多
关键词 security secure software development software development life cycle(SDLC) CONFIDENTIALITY INTEGRITY AVAILABILITY
下载PDF
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
6
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 CRYPTOGRAPHIC security privacy preservation DECRYPTION INTEGRITY
下载PDF
Machine Learning Security Defense Algorithms Based on Metadata Correlation Features
7
作者 Ruchun Jia Jianwei Zhang Yi Lin 《Computers, Materials & Continua》 SCIE EI 2024年第2期2391-2418,共28页
With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The networ... With the popularization of the Internet and the development of technology,cyber threats are increasing day by day.Threats such as malware,hacking,and data breaches have had a serious impact on cybersecurity.The network security environment in the era of big data presents the characteristics of large amounts of data,high diversity,and high real-time requirements.Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats.This paper proposes a machine-learning security defense algorithm based on metadata association features.Emphasize control over unauthorized users through privacy,integrity,and availability.The user model is established and the mapping between the user model and the metadata of the data source is generated.By analyzing the user model and its corresponding mapping relationship,the query of the user model can be decomposed into the query of various heterogeneous data sources,and the integration of heterogeneous data sources based on the metadata association characteristics can be realized.Define and classify customer information,automatically identify and perceive sensitive data,build a behavior audit and analysis platform,analyze user behavior trajectories,and complete the construction of a machine learning customer information security defense system.The experimental results show that when the data volume is 5×103 bit,the data storage integrity of the proposed method is 92%.The data accuracy is 98%,and the success rate of data intrusion is only 2.6%.It can be concluded that the data storage method in this paper is safe,the data accuracy is always at a high level,and the data disaster recovery performance is good.This method can effectively resist data intrusion and has high air traffic control security.It can not only detect all viruses in user data storage,but also realize integrated virus processing,and further optimize the security defense effect of user big data. 展开更多
关键词 Data-oriented architecture METADATA correlation features machine learning security defense data source integration
下载PDF
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
8
作者 Anna Sheri George Jomin George Judy Jenkins 《E-Health Telecommunication Systems and Networks》 2024年第3期23-44,共22页
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec... Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides. 展开更多
关键词 Mobile Devices Patient Privacy Confidentiality Breaches Data security Data Protection Regulatory Compliance User Consent Data Encryption Third-Party integration User Awareness
下载PDF
Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN:Review and Analysis
9
作者 张显石 康戈文 王新珩 《Journal of Southwest Jiaotong University(English Edition)》 2009年第1期16-21,共6页
An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of W... An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of WEP and WPA. Based on the respective performances of WEP and WPA under certain typical attacks, this paper substantiates the judgment that WEP has quite a few vulnerabilities concerning confidentiality and integrity, but at the same time challenges the judgment on WPA with that WPA is robust enough to confront potential typical attacks and is not so unreliable as the current literature believes, although it has some vulnerabilities in its message integrity code (MIC). 展开更多
关键词 WLAN security WEP WPA Temporal key integrity protocol (TKIP)
下载PDF
The Security Strategy of the European Union: Origin, Evolution, and Policy Direction
10
作者 Zhang Jian 《Contemporary International Relations》 2022年第5期1-32,共32页
With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of secur... With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy. 展开更多
关键词 European Union security strategy European integration EU-Russia relations
下载PDF
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
11
作者 Tala Talaei Khoei Hadjar Ould Slimane Naima Kaabouch 《Communications and Network》 2022年第4期119-170,共52页
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba... One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions. 展开更多
关键词 Smart Grid Architecture Cyber-Attacks Network security CONFIDENTIALITY Integrity Availability ACCOUNTABILITY Countermeasures Detection Techniques
下载PDF
Human Security, Poverty Pattern and Social Order in Igbo Rural Communities of Contemporary Nigeria
12
作者 Iwundu Anthony Onyekwere 《Journalism and Mass Communication》 2017年第8期472-479,共8页
The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty,... The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty, social disorder, poor coherence and poor integration appear to haunt them and the gravity is felt more in the rural communities. The factors are traceable to many pathetic issues. The pathological consequences do affect Igbo stability and navigation in the Nigerian socio-economic environment. The causality constitutes the physical, human, natural, financial and social assets. It is recommended, among others, that the people should return to core values and norms, stick to their own noble identities, have a framework for tackling insecurity and hunger, target the youth in poverty reduction measures and tackle the herdsmen menace. Equally, the abused philosophies used to support dangerous and strange behavior should be tackled. 展开更多
关键词 human security poverty pattern social order rural community ASSETS integration
下载PDF
Integrated Evaluation of Ecological Security at Different Scales Using Remote Sensing: A Case Study of Zhongxian County, the Three Gorges Area, China 被引量:27
13
作者 ZUO Wei ZHOU Hui-Zhen +3 位作者 ZHU Xiao-Hua WANG Qiao WANG Wen-Jie WU Xiu-Qin 《Pedosphere》 SCIE CAS CSCD 2005年第4期456-464,共9页
Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-... Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-pressure, state and exposure to pollution-response (DPSER) model as a basis, a conceptual framework of regional ecological evaluation and an index system were established. The extraction and standardization of evaluation indices were carried out with GIS techniques, an information extraction model and a data standardization model. The conversion of regional ecological security results from the pixel scale to a small watershed or county scale was obtained with an evaluation model and a scaling model. Two conceptual scale conversion models of regional ecological security from the pixel scale to the county scale were proposed: 1) scale conversion of ecological security regime results from plxel to small watershed; and 2) scale conversion from pixel to county. These research results could provide useful ideas for regional ecological security evaluation as well as ecological and environmental management. 展开更多
关键词 ecological security integrated evaluation MODELS remote sensing SCALING
下载PDF
Evaluation and scenario simulation for forest ecological security in China 被引量:6
14
作者 Qin Zhang Guangyu Wang +4 位作者 Feng Mi Xuanchang Zhang Lianzhen Xu Yufang Zhang Xiaoli Jiang 《Journal of Forestry Research》 SCIE CAS CSCD 2019年第5期1651-1666,共16页
Continuously growing populations and rapid economic development have led to the excessive use of forest resources,and the forest ecosystem is threatened.In response,forest ecological security(FES)has attracted attenti... Continuously growing populations and rapid economic development have led to the excessive use of forest resources,and the forest ecosystem is threatened.In response,forest ecological security(FES)has attracted attention.In this study,an integrated dynamic simulation model was constructed using the system dynamic method,and it was used to evaluate the FES in China from 1999 to 2014.A scenario analysis was then used to evaluate the changes in the FES under five forestry policy scenarios for the 2015–2050 period,including the baseline,afforestation policy,harvesting policies,management policy,investment policy,and a policy mix.The results showed that the evaluation values of the FES increased during the period from 1999 to 2002,the period from 2004 to 2010 and the year 2014,and they decreased in 2003 and during the period from 2011 to 2013.During the 2015–2050 simulation period,the FES improved continuously.In particular,China would enter a new stage when the economic systems,social systems and ecosystems were in harmony after 2040.To improve the FES and the current status of the FES,a scenario analysis showed the most suitable scenario to be Scenario 5 from 2015 to 2020 and Scenario 2 from 2021 to 2050.To relieve pressure,the most suitable scenario would be Scenario 5 from 2015 to 2040 and from 2046 to 2050,and the most suitable scenario would be Scenario 4 for 2041–2045.A policy mix(Scenario 5)would be most efficient under current conditions,while the effects of all the benefits of the forestry policies would weaken over the long term.The integrated method can be regarded as a decision support tool to help policy makers understand FES and promulgate a reasonable forestry policy. 展开更多
关键词 DYNAMIC change TREND FOREST ECOLOGICAL security Integrated EVALUATION method System DYNAMIC model POLICY simulation
下载PDF
Promoting Common Prosperity through Urban-Rural Integration: Practical Challenges, Institutional Logic, and Progressive Approaches for the Social Security System
15
作者 ZHAl Shaoguo XU Tianshu 《Frontiers of Economics in China-Selected Publications from Chinese Universities》 2024年第3期292-311,共20页
Urban-rural integration serves as a pragmatic strategy for developing social security in China,while promoting common prosperity represents a value-driven choice.Moving from urban-rural integration toward promoting co... Urban-rural integration serves as a pragmatic strategy for developing social security in China,while promoting common prosperity represents a value-driven choice.Moving from urban-rural integration toward promoting common prosperity,the social security system faces several practical challenges,including limited medical and healthcare resources,disparities in social insurance benefits,inadequacies in socialassistancelevels,and deficiencies in social welfare expenditures.To overcome these challenges,a gradual practical approach has been formed based on three institutional logics:the institutional integration logic for bridging the gap,the institutional adaptability logic for enhancing resilience,and the institutional enhancement logic for empowering prosperity.This approach involves a progression from management integration to institutional alignment and system integration.Promotion of common prosperity through urban-rural integration not only provides a practical perspective and realistic depiction of China's unique social security system but also encompasses the institutional civilization and value implications associated with the development of social security in China. 展开更多
关键词 social security urban-rural integration common prosperity
原文传递
Knowledge acquisition, semantic text mining, and security risks in health and biomedical informatics 被引量:2
16
作者 J Harold Pardue William T Gerthoffer 《World Journal of Biological Chemistry》 CAS 2012年第2期27-33,共7页
Computational techniques have been adopted in medi-cal and biological systems for a long time. There is no doubt that the development and application of computational methods will render great help in better understan... Computational techniques have been adopted in medi-cal and biological systems for a long time. There is no doubt that the development and application of computational methods will render great help in better understanding biomedical and biological functions. Large amounts of datasets have been produced by biomedical and biological experiments and simulations. In order for researchers to gain knowledge from origi- nal data, nontrivial transformation is necessary, which is regarded as a critical link in the chain of knowledge acquisition, sharing, and reuse. Challenges that have been encountered include: how to efficiently and effectively represent human knowledge in formal computing models, how to take advantage of semantic text mining techniques rather than traditional syntactic text mining, and how to handle security issues during the knowledge sharing and reuse. This paper summarizes the state-of-the-art in these research directions. We aim to provide readers with an introduction of major computing themes to be applied to the medical and biological research. 展开更多
关键词 BIOMEDICAL informatics BIOINFORMATICS Knowledge SHARING Ontology matching Heterogeneous SEMANTICS SEMANTIC integration SEMANTIC data MINING SEMANTIC text MINING security risk
下载PDF
Design of the XML Security System for Electronic Commerce Application 被引量:1
17
作者 安南 Zhang Shensheng 《High Technology Letters》 EI CAS 2003年第2期81-86,共6页
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu... The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application. 展开更多
关键词 electronic commerce security digital certificates smart card digital commerce AUTHENTICATION transaction integrity verification internet XML
下载PDF
Information Availability: An Insight into the Most Important Attribute of Information Security 被引量:2
18
作者 Suhail Qadir S. M. K. Quadri 《Journal of Information Security》 2016年第3期185-194,共10页
This paper presents an in-depth understanding of Availability, which is one of the important pillars of Information Security and yet is not taken too seriously while talking about the security of an information system... This paper presents an in-depth understanding of Availability, which is one of the important pillars of Information Security and yet is not taken too seriously while talking about the security of an information system. The paper highlights the importance of Availability w.r.t. Security of information and the other attributes of security and also gives a realistic shape to the existing CIA triad security model. An in-depth understanding of the various factors that can impact the Availability of an information system (Software, Hardware and Network) is given. The paper also gives a categorization of the type of Availability that a system can have. The paper also explains the relation between Availability and other security attributes and also explains through what issues an information system may go while providing Availability. 展开更多
关键词 Information security AVAILABILITY Confidentaility Integrity Information System CIA Triad
下载PDF
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 被引量:1
19
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Muhammad Farhan Umar Mahmood 《Journal of Information Security》 2021年第3期189-211,共23页
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err... Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span> 展开更多
关键词 Business Logic Design Flaws Components integration Flaws E-Commerce System Assurance & security Model Based Design Business Logic Attacks Attack Pattern
下载PDF
A Survey of Web Information System and Applications
20
作者 HAN Yanbo LI Juanzi +3 位作者 YANG Nan LIU Qing XU Baowen MENG Xiaofeng 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期769-772,共4页
The fourth international conference on Web information systems and applications (WISA 2007) has received 409 submissions and has accepted 37 papers for publication in this issue. The papers cover broad research area... The fourth international conference on Web information systems and applications (WISA 2007) has received 409 submissions and has accepted 37 papers for publication in this issue. The papers cover broad research areas, including Web mining and data warehouse, Deep Web and Web integration, P2P networks, text processing and information retrieval, as well as Web Services and Web infrastructure. After briefly introducing the WISA conference, the survey outlines the current activities and future trends concerning Web information systems and applications based on the papers accepted for publication. 展开更多
关键词 Web mining data warehouse Deep Web Web integration Web services P2P computing text processing information retrieval Web security
下载PDF
上一页 1 2 125 下一页 到第
使用帮助 返回顶部