期刊文献+
共找到3,838篇文章
< 1 2 192 >
每页显示 20 50 100
Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
1
作者 Yanan Chen Ting Yao +1 位作者 Haiping Ren Zehao Gan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第6期1497-1513,共17页
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature ne... The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature needs to be converted into a re-signature that can be verified by the new organization.Proxy re-signature(PRS)can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data.Unfortunately,the existing PRS schemes cannot realize forward and backward security.Therefore,this paper proposes the first PRS scheme that can provide key-insulated property,which can guarantee both the forward and backward security of the key.Although the leakage of the private key occurs at a certain moment,the forward and backward key will not be attacked.Thus,the purpose of key insulation is implemented.What’s more,it can update different corresponding private keys in infinite time periods without changing the identity information of the user as the public key.Besides,the unforgeability of our scheme is proved based on the extended Computational Diffie-Hellman assumption in the random oracle model.Finally,the experimental simulation demonstrates that our scheme is feasible and in possession of promising properties. 展开更多
关键词 proxy re-signature key insulation electronic medical record(EHR) random oracle model
下载PDF
THRESHOLD PROXY RE-SIGNATURE 被引量:7
2
作者 Piyi YANG Zhenfu CAO Xiaolei DONG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第4期816-824,共9页
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to... The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach. 展开更多
关键词 proxy re-signature ROBUST THRESHOLD unforgeable.
原文传递
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
3
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
4
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
5
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
Comparative analysis of extreme ultraviolet solar radiation proxies during minimum activity levels 被引量:1
6
作者 A.G.Elias C.R.Martinis +4 位作者 B.F.de Haro Barbas F.D.Medina B.S.Zossi M.Fagre T.Duran 《Earth and Planetary Physics》 CAS CSCD 2023年第5期540-547,共8页
Four extreme ultraviolet(EUV)solar radiation proxies(Magnesium II core-to-wing ratio(MgII),Lymanαflux(Fα),10.7-cm solar radio flux(F10.7),and sunspot number(Rz))were analyzed during the last four consecutive solar a... Four extreme ultraviolet(EUV)solar radiation proxies(Magnesium II core-to-wing ratio(MgII),Lymanαflux(Fα),10.7-cm solar radio flux(F10.7),and sunspot number(Rz))were analyzed during the last four consecutive solar activity minima to investigate how they differ during minimum periods and how well they represent solar EUV radiation.Their variability within each minimum and between minima was compared by considering monthly means.A comparison was also made of their role in filtering the effect of solar activity from the critical frequency of the ionospheric F2 layer,foF2,which at mid to low latitudes depends mainly on EUV solar radiation.The last two solar cycles showed unusually low EUV radiation levels according to the four proxies.Regarding the connection between the EUV“true”variation and that of solar proxies,according to the foF2 filtering analysis,MgII and Fαbehaved in a more stable and suitable way,whereas Rz and F10.7 could be overestimating EUV levels during the last two minima,implying they would both underestimate the inter-minima difference of EUV when compared with the first two minima. 展开更多
关键词 solar EUV radiation solar minimum FOF2 solar activity solar EUV proxy
下载PDF
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
7
作者 Caifen Wang Bin Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1857-1878,共22页
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing.One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results.Linearly homomorphic proxy signature(LHPS)is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right.Blockchain has the characteristics of tamper-proof and traceability,and is a new technology to solve data security.However,as far as we know,constructions of LHPS have been few and far between.In addition,the existing LHPS scheme does not focus on homomorphic unforgeability and does not use blockchain technology.Herein,we improve the security model of the LHPS scheme,and the usual existential forgery and homomorphic existential forgery of two types of adversaries are considered.Under the new model,we present a blockchain-based LHPS scheme.The security analysis shows that under the adaptive chosen message attack,the unforgeability of the proposed scheme can be reduced to the CDH hard assumption,while achieving the usual and homomorphic existential unforgeability.Moreover,comparedwith the previous LHPS scheme,the performance analysis shows that our scheme has the same key size and comparable computational overhead,but has higher security. 展开更多
关键词 Homomorphic signature proxy signature security model provable security UNFORGEABILITY
下载PDF
The Connection Between Medical Self-determination and the System of Adult Guardianship——The Institutional Construction of Medical Proxy
8
作者 李敏 SU Yilong 《The Journal of Human Rights》 2023年第3期576-598,共23页
China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since pati... China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since patients’capacity to consent is the prerequisite,when the patient is a fully competent person,it is sufficient to give consent based on valid notification by the doctor.However,for those who are unable to give valid consent,especially adult patients with impaired capacity,resolving the legality of the doctor’s medical conduct remains an issue when it infringes on the patient’s body and health.To solve this issue,someone must give consent in place of the patient when the adult is unable to give valid consent.However,the personal and exclusive nature of the right to medical consent,which is informed consent,makes it impossible to simply delegate it to a guardian or other person to exercise it on behalf of the patient.In this paper,we borrow the concept of“medical proxy”proposed by Japanese scholar Teruaki Tayama,and for the first time,we discuss the construction of medical proxy from the perspective of adult guardianship by connecting the two systems from the standpoint of interpretive theory. 展开更多
关键词 medical proxy medical self-determination adult guardianship capacity to consent
下载PDF
一种航天器在轨环境下结构变形的反演方法
9
作者 孙维 王丁 +5 位作者 罗文波 阎军 田阔 赵文彦 任晗 张鹏 《航天器环境工程》 CSCD 2024年第3期290-295,共6页
为实现航天器在轨结构变形高效计算,提出一种基于神经网络的结构变形反演方法:借助有限元分析法获得结构在不同温度载荷作用下的变形分布特征,并利用获取的数据对输入和输出间神经网络进行训练,获取高精度的代理模型。利用该模型,可以... 为实现航天器在轨结构变形高效计算,提出一种基于神经网络的结构变形反演方法:借助有限元分析法获得结构在不同温度载荷作用下的变形分布特征,并利用获取的数据对输入和输出间神经网络进行训练,获取高精度的代理模型。利用该模型,可以在轨测量的温度作为输入,实现对航天器结构全场变形的快速反演;可通过引入合适参数的高斯噪声,增强神经网络对于输入误差的适应能力;可用改进的连接权值分析方法,给出确定传感器数量下,实现变形反演精度最高的结构温度测点的布局优化方案。综上,该反演方法具有精度高、实时性强、受输入误差影响小等优点,其应用对于提升遥感卫星的成像质量具有重要意义。 展开更多
关键词 航天器 结构变形 位移场反演 神经网络 代理模型
下载PDF
基于代理指标的供水管网抗震改造优化
10
作者 侯本伟 程雪 +2 位作者 缪惠全 韩俊艳 吴珊 《防灾减灾工程学报》 CSCD 北大核心 2024年第4期839-848,共10页
基于水力模型计算的管网供水量满足率(SSIQ)指标,是评估供水管网震后性能的常用指标。在供水管网抗震改造优化模型中,若采用SSIQ表示优化目标函数,优化求解需进行大量水力模型计算,计算耗时很长。为减小管网抗震改造优化模型的计算量,... 基于水力模型计算的管网供水量满足率(SSIQ)指标,是评估供水管网震后性能的常用指标。在供水管网抗震改造优化模型中,若采用SSIQ表示优化目标函数,优化求解需进行大量水力模型计算,计算耗时很长。为减小管网抗震改造优化模型的计算量,对节点流量韧性指标(FR)进行了改进,增加了管道破坏漏水能量损失的影响项,提出了一种管网能量指标(Energy Resilience, ER)表示震后管网性能;以ER指标作为SSIQ的代理指标,用于量化抗震改造优化模型的目标函数。仅通过管道地震失效概率、管网震前正常运行工况的水力参数计算ER指标,不必进行震后管网水力模型计算,以期提升优化模型计算效率。以供水管网震后性能最大化和改造费用最小化为目标,以管道抗震改造措施为优化变量,建立了管网抗震改造多目标优化模型,并比较了ER指标、FR指标以及两个拓扑代理指标的替代效果。案例管网应用结果表明,ER指标与SSIQ指标相关系数呈现强相关性,基于ER指标的优化方案与基于SSIQ指标的优化方案的差异小于3%,ER指标优化模型计算时间不足SSIQ指标优化模型计算时间的1%。 展开更多
关键词 供水管网 地震破坏 性能评估 优化改造 代理指标
下载PDF
委托代持担保物权的法律效力
11
作者 高圣平 陈南成 《苏州大学学报(法学版)》 CSSCI 2024年第2期123-136,共14页
在特定的交易模式中,担保物权可由他人代为持有。为使金融交易方式更加灵活便捷,应缓和担保物权设立上的从属性,允许为将来债权提供担保,在担保物权可得实现之时,主债权真实存在即可。在权利归属认定中,法院不宜恪守于权利登记内容,在... 在特定的交易模式中,担保物权可由他人代为持有。为使金融交易方式更加灵活便捷,应缓和担保物权设立上的从属性,允许为将来债权提供担保,在担保物权可得实现之时,主债权真实存在即可。在权利归属认定中,法院不宜恪守于权利登记内容,在不影响第三人权益的前提下,应尊重当事人间的真实意思表示,认定债权人为实际权利人。倘若名义权利人将登记系统上所登记的债权及担保物权无权处分给第三人,善意取得规则自有适用空间。在担保物权可得实现之时,原则上债权人和受托人均可行使担保物权。在特殊情形下,担保物权的行使主体可由当事人约定。 展开更多
关键词 委托代持 从属性 登记公示 无权处分 准共有
下载PDF
基于SSA-BP神经网络的车-轨-桥系统随机振动分析
12
作者 何旭辉 赵永帅 蔡陈之 《铁道科学与工程学报》 EI CAS CSCD 北大核心 2024年第8期3225-3236,共12页
轨道及桥梁结构参数随机性对车-轨-桥耦合系统的振动影响不能忽略。基于代理模型研究轨道-桥梁间3层弹簧刚度和弹簧阻尼以及桥梁刚度和阻尼的随机性对竖向车-轨-桥耦合系统动力响应的影响。首先,基于经典的车-轨-桥耦合系统力学模型(没... 轨道及桥梁结构参数随机性对车-轨-桥耦合系统的振动影响不能忽略。基于代理模型研究轨道-桥梁间3层弹簧刚度和弹簧阻尼以及桥梁刚度和阻尼的随机性对竖向车-轨-桥耦合系统动力响应的影响。首先,基于经典的车-轨-桥耦合系统力学模型(没有考虑桥墩),采用Monte-Carlo生成2 000个样本集,作为代理模型的训练集。然后,对比SSA-BP(麻雀优化BP算法)与传统BP神经网络、GA-BP神经网络(遗传优化BP算法)对车辆和桥梁响应的预测精度,同时探讨样本数量以及Levenberg-Marquardt和Bayesian Regulation训练算法对SSA-BP神经网络预测精度的影响。最后,假定各随机参数概率分布规律服从高斯型正态分布,所有随机参数变异系数均分为0.05、0.10、0.15、0.20、0.25等5个级别,采用所提出的SSA-BP神经网络研究轨道及桥梁的刚度和阻尼变化对车辆和桥梁响应极值的影响。结果表明:与经典的车-轨-桥耦合系统力学模型相比,所提出的代理模型具有更高的计算效率;SSA-BP模型对车辆和桥梁响应的预测精度高于GA-BP模型,GA-BP模型的预测精度高于传统的BP模型;SSA-BP模型采用Levenberg-Marquardt训练算法对车辆和桥梁响应的预测精度优于Bayesian Regulation训练算法的预测精度;道砟和桥梁之间弹簧刚度的随机变化对桥梁随机振动响应尤为明显;钢轨和轨枕之间弹簧刚度的随机性对车体响应的影响不可忽视,而桥梁刚度和阻尼随机性对车体的影响可不考虑。研究成果可为车轨桥系统随机振动响应预测进一步研究提供依据和参考。 展开更多
关键词 桥梁工程 车轨桥系统 SSA-BP 随机振动 代理模型
下载PDF
云存储与区块链相结合的电子数据共享模型研究
13
作者 陈潮 沈张汇 《现代计算机》 2024年第12期57-61,共5页
为解决公安局、检察院、法院及其他司法单位间电子数据共享中存在的低共享程度、安全性不足以及业务协同效率低下等问题,综合运用云存储、区块链、非对称加密、密文可搜索和代理重加密等技术,提出了一种云存储技术与联盟区块链技术相结... 为解决公安局、检察院、法院及其他司法单位间电子数据共享中存在的低共享程度、安全性不足以及业务协同效率低下等问题,综合运用云存储、区块链、非对称加密、密文可搜索和代理重加密等技术,提出了一种云存储技术与联盟区块链技术相结合的电子数据共享模型。通过理论分析和模型构建,表明该模型能够在公检法等司法单位之间实现电子数据的高效、安全可靠和可溯源共享,从而提高了司法协同效率,而且为司法领域的数字化改革提供了理论基础和技术框架,对推动司法工作的数字化转型具有重要的理论和实践意义。 展开更多
关键词 电子数据共享 区块链 云存储 代理重加密
下载PDF
基于安全代理的信任服务适配方法
14
作者 丁文超 余双波 +1 位作者 薛艳珠 房冬丽 《电脑与电信》 2024年第6期31-34,39,共5页
随着各种服务的大规模应用,其带来的协议适配及安全问题日益凸显,如何建立一种信任服务适配的统一机制,提升服务适配的可用性和安全性,已成为相关行业关注的焦点。在网络信任系统建设中,不同服务间组合共同构成一个完整的网络信任服务体... 随着各种服务的大规模应用,其带来的协议适配及安全问题日益凸显,如何建立一种信任服务适配的统一机制,提升服务适配的可用性和安全性,已成为相关行业关注的焦点。在网络信任系统建设中,不同服务间组合共同构成一个完整的网络信任服务体系,形成分布式服务系统的场景越来越多。信任服务之间交互频繁,传统的服务适配机制直接移植到信任服务体系中会极大降低交互效率和扩展性,因此提出一种基于安全代理的信任服务适配方法,主要解决的技术问题为服务适配的可用性、扩展性和安全性。该方案能够满足服务状态自适应变化、提升服务适配的可用性,同时确保交互双方的身份以及保证交互过程中数据安全。 展开更多
关键词 服务适配 信任体系 安全代理 数据安全 分布式服务
下载PDF
支持受控共享的医疗数据隐私保护方案 被引量:2
15
作者 郭庆 田有亮 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2024年第1期165-177,共13页
患者医疗健康数据信息的合理利用促进了医学研究机构的发展。针对目前患者与医疗研究机构间共享医疗数据隐私易泄露,以及患者对医疗数据的使用情况不可控的问题,提出一种支持受控共享的医疗数据隐私保护方案。首先,将区块链与代理服务... 患者医疗健康数据信息的合理利用促进了医学研究机构的发展。针对目前患者与医疗研究机构间共享医疗数据隐私易泄露,以及患者对医疗数据的使用情况不可控的问题,提出一种支持受控共享的医疗数据隐私保护方案。首先,将区块链与代理服务器结合设计医疗数据受控共享模型,区块链矿工节点分布式构造代理重加密密钥,使用代理服务器存储和转换医疗数据密文,利用代理重加密技术在保护患者隐私的同时实现医疗数据安全共享。其次,设计用户权限动态调整机制,由患者与区块链授权管理节点交互通过授权列表来更新医疗数据访问权限,实现患者对医疗数据的可控共享。最后,安全性分析表明,所提方案可以在医疗数据隐私保护的同时,实现医疗数据动态共享,并且可以抵抗共谋攻击。性能分析表明,该方案在通信开销、计算开销方面具有优势,适用于患者或医院与研究机构间的数据受控共享。 展开更多
关键词 区块链 医疗数据 受控共享 代理重加密 隐私保护
下载PDF
陕南勉县寒武系仙女洞组生物礁岩相学及古环境分析 被引量:4
16
作者 李雅兰 李飞 +7 位作者 吕月健 王夏 王曾俊 李红 易楚恒 李杨凡 曾伟 李怡霖 《沉积学报》 CAS CSCD 北大核心 2024年第2期608-618,共11页
【目的】生物礁演化史上一个关键节点是寒武纪早期广泛出现了后生动物古杯与微生物群落的联合造礁,该造礁群落形成环境和发育条件值得探讨。【方法】以华南板块西北缘汉南—米仓山地区的勉县大河坝剖面为例,对寒武系仙女洞组沉积序列和... 【目的】生物礁演化史上一个关键节点是寒武纪早期广泛出现了后生动物古杯与微生物群落的联合造礁,该造礁群落形成环境和发育条件值得探讨。【方法】以华南板块西北缘汉南—米仓山地区的勉县大河坝剖面为例,对寒武系仙女洞组沉积序列和生物礁临近层位开展了系统的岩相学、沉积学和元素地球化学分析。【结果】岩相学特征显示礁体形成于海退背景下的临滨带环境,建造过程可依次分为钙质微生物主导、古杯动物大量繁盛以及古杯与钙质微生物联合建造三个阶段。生物礁灰岩中的陆源碎屑组分含量向上增多,且颗粒变粗,顶部被中—细砂岩覆盖。【结论】古杯—钙质微生物礁生长过程中对低强度的陆源碎屑输入具有一定的耐受度,当粗粒陆源碎屑组分的持续、高强度输入时将造成生物礁发育终止。本实例揭示了古杯—钙质微生物造礁群落生长过程与海底生态指标的相关性,可为古环境学、沉积学和储层地质学相关研究提供参考。 展开更多
关键词 古杯—钙质微生物群落 礁灰岩 古环境指标 寒武纪第三期 汉南—米仓山地区
下载PDF
基于Proxy的网络计费系统的设计与实现 被引量:15
17
作者 易正强 王耀军 《计算机工程》 CAS CSCD 北大核心 2001年第2期166-168,共3页
讨论在校园网环境下的网络计费,对基于Proxy的网络计费与管理进行了详细设计,给出了巨量数据的处理方法。
关键词 校园网 网络计费系统 代理服务器 proxy INTERNE
下载PDF
一种基于Proxy的Web应用安全漏洞检测方法及实现 被引量:6
18
作者 王鹃 李俊娥 刘珺 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2005年第5期135-140,共6页
指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL... 指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL代码插入、跨站点脚本算法的JAVA语言实现. 展开更多
关键词 WEB应用安全 漏洞检测 proxy JAVA
下载PDF
全民所有自然资源资产所有权委托代理行使机制探讨 被引量:4
19
作者 李哲 吴爽 《中国国土资源经济》 2024年第3期43-51,57,共10页
全民所有自然资源资产所有权委托代理机制是自然资源资产所有权的一种行使方式,是落实自然资源资产全民所有的重要举措,也是社会主义公有制的实现方式。目前,对于全民所有自然资源资产所有权委托代理制度,法律并无明确规定,试点地区开... 全民所有自然资源资产所有权委托代理机制是自然资源资产所有权的一种行使方式,是落实自然资源资产全民所有的重要举措,也是社会主义公有制的实现方式。目前,对于全民所有自然资源资产所有权委托代理制度,法律并无明确规定,试点地区开始探索行之有效的委托代理履职模式。文章通过梳理试点地区的实践经验,发现全民所有自然资源资产所有权委托代理面临所有权行使的权责不明确、自然资源资产“家底”不清、委托代理制度不健全等困境。基于此,文章从优化权责分配关系、做好资产清查和统计工作、科学编制自然资源清单、完善委托代理制度等方面提出建议。 展开更多
关键词 全民所有 委托代理 所有者职责
下载PDF
基于MS Proxy Server的网络计费系统的实现 被引量:2
20
作者 邹刚 敖永红 +1 位作者 柯水洲 曹承倜 《计算机工程与应用》 CSCD 北大核心 2003年第6期151-154,共4页
文中介绍了代理服务器的计费方式,阐述了基于MSProxyServer的网络计费系统的设计与实现。
关键词 MS proxy Server 网络计费系统 计算机网络 网络管理 防火墙 代理服务器
下载PDF
上一页 1 2 192 下一页 到第
使用帮助 返回顶部