期刊文献+
共找到1,590篇文章
< 1 2 80 >
每页显示 20 50 100
The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises
1
作者 Ja’far Alqatawna 《Journal of Software Engineering and Applications》 2014年第10期883-890,共8页
The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. Th... The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and systematic way to protect their e-Business activities. However, the suitability of available information security standards for Small and Medium e-Business Enterprises (e-SME) is worth further investigation. In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. Accordingly, several challenges associated with these standards that may render them difficult to be implemented in e-SME have been identified. 展开更多
关键词 Information security STANDARDS e-business Small and MEDIUM ENTERPRISES
下载PDF
Quantitative analysis of the dynamic change and spatial differences of the ecological security: a case study of Loess Plateau in northern Shaanxi Province 被引量:5
2
作者 LI Jing REN Zhiyuan ZHOU Zixiang 《Journal of Geographical Sciences》 SCIE CSCD 2006年第2期251-256,共6页
Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecologica... Using the theory and method of the ecological footprint, and combining the changes of regional land use, resource environment, population, society and economy, this paper calculated the ecological footprint, ecological carrying capacity and ecological surplus/loss in 1986-2002 on the Loess Plateau in northern Shaanxi Province. What is more, this paper has put forward the concept of ecological pressure index, set up ecological pressure index models, and ecological security grading systems, and the prediction models of different ecological footprints, ecological carrying capacity, ecological surplus and ecological safety change, and also has assessed the ecological footprint demands of 10,000 yuan GDE The results of this study are as follows: (1) the ecological carrying capacity in northern Shaanxi shows a decreasing trend, the difference of reducing range is the fastest; (2) the ecological footprint appears an increasing trend; (3) ecological pressure index rose to 0.91 from 0.44 during 1986-2002 on the Loess Plateau of northern Shaanxi with an increase of 47%; and (4) the ecological security in the study area is in a critical state, and the ecological oressure index has been increasing rapidlv. 展开更多
关键词 regional ecological security dynamic change spatial difference quantitative analysis the Loess Plateau in northern Shaanxi Province
下载PDF
Dynamic defenses in cyber security:Techniques,methods and challenges Author links open overlay panel 被引量:7
3
作者 Yu Zheng Zheng Li +1 位作者 Xiaolong Xu Qingzhan Zhao 《Digital Communications and Networks》 SCIE CSCD 2022年第4期422-435,共14页
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.Howe... Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security. 展开更多
关键词 Cyber security dynamic defense Moving target defense Mimic defense
下载PDF
Dynamic Evaluation of Land Ecological Security in Anhui Province Based on PSR Model 被引量:3
4
作者 Pan Runqiu Yao Xing 《Meteorological and Environmental Research》 CAS 2016年第3期19-26,共8页
Based on PSR framework method, the land ecological security evaluation index system of 16 cities of Anhui Province was constructed. The land ecological security value of subsystem in Anhui Province from 2000 to 2011 w... Based on PSR framework method, the land ecological security evaluation index system of 16 cities of Anhui Province was constructed. The land ecological security value of subsystem in Anhui Province from 2000 to 2011 was calculated using the index weight which was determined by the entropy weight method, and land ecological security trend from 2012 to 2017 was forecasted using GM (1,1) model. The results indicated that, the land ecological security index in Anhui Province from 2000 to 2017 was rising on the whole, with the average value increasing from 0.442 in 2000 to 0.450 in 2017, and there was a huge difference among cities; at the same time, the state index and response index of each subsystem of land ecological security also rose. GM ( 1, 1 ) model had high simulation precision and was able to predict the land ecological security level and the de- velopment trend of each subsystem of Anhui Province from 2012 to 2017. The main factors that influenced the land ecological security of Anhui Prov- ince included per capita farmland area, population density, natural growth rate of population, urbanization level, soil coordination degree, agricultur- al mechanization degree, and the area proportion of nature reserve, which are the focus of land ecological security regulation in the future. 展开更多
关键词 Land ecological security GM(1 1 model dynamic analysis PREDICTION Anhui Province China
下载PDF
Urban Market-Gardening in Parakou (Republic of Benin): Spatial Dynamics, Food Security, Protection of the Environment and Creation of Employments 被引量:1
5
作者 Abdoul-Ramane Abdoulaye Aboudou Yacoubou Mama Aboudou Ramanou 《Journal of Geoscience and Environment Protection》 2015年第5期93-103,共11页
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho... Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments. 展开更多
关键词 URBAN Agriculture Food security Market-Gardening Channel Land dynamics PROTECTION of the Environment Employment Parakou
下载PDF
Arctic security: evolution of Arctic security dynamics and prospect for a security regime in the Arctic
6
作者 DENG Beixi 《Advances in Polar Science》 2016年第3期163-169,共7页
The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arc... The security dynamics in the Arctic since the Cold War has transitioned from militarization, to de-militarization, and to re-militarization. Under the circumstances of ongoing globalization and climate change, the Arctic states have accorded priority to the enhancement of military capacities in the region, with a view to safeguarding sovereign rights, ensuring navigation security of Arctic waterways, responding to contingencies and guaranteeing civil security. Such military capacity-building measures are otherwise interpreted as initiatives to resume arms race in the Arctic, which would be contributive to the security dilemma. Subject to the structural competition of the U.S. - Russia rivalry, there has long been an absence of a security regime in the Arctic. Nevertheless, the build-up of security regimes in the Arctic constitutes a major concern for the Arctic states, as well as for some extra-regional stakeholders. In the Arctic regional context, the ever-intensifying institutional cooperation in the domains of non- traditional and civil security lays the cornerstone for establishing confidence-building measures, and gives rise to the consensus that maintaining cooperation in the Arctic will be mutually rewarding for all. 展开更多
关键词 Arctic security dynamics Arctic security regime NATO
下载PDF
Dynamic Tracking and Comprehensive Evaluation on the Natural Resources Security Elements and System in China
7
作者 Yao Yulong Zhou Hong 《Chinese Journal of Population,Resources and Environment》 2010年第2期32-39,共8页
System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Base... System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Based on analytic hierarchy process and Delphi methods,the natural resources security situation has been evaluated systematically from 1991 to 2007.The result showed that the overall level of China's natural resources security presented a downtrend from 1991 to 2007.The basic reasons are the pressure indicators such as population,GDP,natural resources trade increased gradually,resulting in tension and fragility of natural resources security. 展开更多
关键词 natural resources security indicator system dynamic tracking comprehensive evaluation
下载PDF
Security and Stability Aspects of Multi Objective Dynamic Economic Dispatch with Renewable Energy and HVDC Transmission Lines
8
作者 Moses Peter Musau 《Journal of Power and Energy Engineering》 2018年第9期165-187,共23页
Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant pene... Renewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant penetration demands a thorough research in terms of system reliability, that is, security and stability. In this paper, Security Constrained Multi Objective Dynamic Economic Dispatch (SCMODED) problem considering cubic thermal cubic cost function, wind, solar penetration, cubic transmission power losses and cubic emissions cost function as objectives is first formulated. Both HVDC and HVAC lines are included in their formulation. Various approaches like probabilistic load flow (PLF), scenario based method, participation factors and Harmony Search algorithm etc. are employed in the solution process. Security and stability effects of renewable energy (RE) penetration are investigated and analyzed. The simulated results reveal that RE penetration leads to reduced cost and emissions and increased security concerns. Further, there is increased power system instability and hence increased load shedding so as to help the power system attain steady state stability. Inclusion of HVDC lines facilitates rapid and fast control to increase the transient stability limit by the action of the converter ignition angle (CIA) and converter extinction angle (CEA). 展开更多
关键词 security CONSTRAINED Multi Objective dynamic ECONOMIC DISPATCH (SCMODED) RENEWABLE Energy (RE) Stability HVDC LINES
下载PDF
Prediction of Instability Separation Modes and Its Application in Practical Dynamic Security Region
9
作者 曾沅 余贻鑫 +3 位作者 王红梅 闵亮 张沛 LEES T 《Transactions of Tianjin University》 EI CAS 2007年第3期157-162,共6页
The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is propose... The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improved. 展开更多
关键词 instability separation mode dynamic security region K-medoids algorithm reachability Grammian
下载PDF
Tourism Destination Eco-Security and Its Dynamic Evaluation Method 被引量:1
10
作者 SU Qiaolan 《Journal of Landscape Research》 2013年第Z1期35-37,40,共4页
Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understand... Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed. 展开更多
关键词 TOURISM DESTINATION Eco-security P-S-R MODE dynamIC EVALUATION
下载PDF
An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid Security
11
作者 Ding Daoqi State Grid Information & Telecommunication Co.,Ltd.Zhao Fang 《Electricity》 2009年第2期45-51,共7页
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The... In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS. 展开更多
关键词 EMS 2003 WAMS An In-Depth Study of Complex Power System dynamic Behavior Characteristics for Chinese UHV Power Grid security
下载PDF
Critical Contingencies Ranking for Dynamic Security Assessment Using Neural Networks
12
作者 Gustavo Schweickardt Juan Manuel Gimenez-Alvarez 《Journal of Energy and Power Engineering》 2012年第10期1663-1672,共10页
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se... A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state. 展开更多
关键词 Critical contingencies dynamic security assessment neural networks.
下载PDF
Evaluation and scenario simulation for forest ecological security in China 被引量:6
13
作者 Qin Zhang Guangyu Wang +4 位作者 Feng Mi Xuanchang Zhang Lianzhen Xu Yufang Zhang Xiaoli Jiang 《Journal of Forestry Research》 SCIE CAS CSCD 2019年第5期1651-1666,共16页
Continuously growing populations and rapid economic development have led to the excessive use of forest resources,and the forest ecosystem is threatened.In response,forest ecological security(FES)has attracted attenti... Continuously growing populations and rapid economic development have led to the excessive use of forest resources,and the forest ecosystem is threatened.In response,forest ecological security(FES)has attracted attention.In this study,an integrated dynamic simulation model was constructed using the system dynamic method,and it was used to evaluate the FES in China from 1999 to 2014.A scenario analysis was then used to evaluate the changes in the FES under five forestry policy scenarios for the 2015–2050 period,including the baseline,afforestation policy,harvesting policies,management policy,investment policy,and a policy mix.The results showed that the evaluation values of the FES increased during the period from 1999 to 2002,the period from 2004 to 2010 and the year 2014,and they decreased in 2003 and during the period from 2011 to 2013.During the 2015–2050 simulation period,the FES improved continuously.In particular,China would enter a new stage when the economic systems,social systems and ecosystems were in harmony after 2040.To improve the FES and the current status of the FES,a scenario analysis showed the most suitable scenario to be Scenario 5 from 2015 to 2020 and Scenario 2 from 2021 to 2050.To relieve pressure,the most suitable scenario would be Scenario 5 from 2015 to 2040 and from 2046 to 2050,and the most suitable scenario would be Scenario 4 for 2041–2045.A policy mix(Scenario 5)would be most efficient under current conditions,while the effects of all the benefits of the forestry policies would weaken over the long term.The integrated method can be regarded as a decision support tool to help policy makers understand FES and promulgate a reasonable forestry policy. 展开更多
关键词 dynamIC change TREND FOREST ECOLOGICAL security Integrated EVALUATION method System dynamIC model POLICY simulation
下载PDF
Theory and Method of Power System Integrated Security Region Irrelevant to Operation States:An Introduction 被引量:15
14
作者 Yixin Yu Yanli Liu +1 位作者 Chao Qin Tiankai Yang 《Engineering》 SCIE EI 2020年第7期754-777,共24页
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio... How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude. 展开更多
关键词 security region Composition Power flow security Static voltage stability small-disturbance stability Transient stability dynamics nature Topological and geometric characteristics HYPERPLANE
下载PDF
Cyberspace Endogenous Safety and Security 被引量:4
15
作者 Jiangxing Wu 《Engineering》 SCIE EI CAS 2022年第8期179-185,共7页
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"... Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR. 展开更多
关键词 Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security Relative right axiom dynamic heterogeneous redundant architecture
下载PDF
Secure Synchronization Control for a Class of Cyber-Physical Systems With Unknown Dynamics 被引量:3
16
作者 Ning Wang Xiaojian Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1215-1224,共10页
This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an opt... This paper investigates the secure synchronization control problem for a class of cyber-physical systems(CPSs)with unknown system matrices and intermittent denial-of-service(DoS)attacks.For the attack free case,an optimal control law consisting of a feedback control and a compensated feedforward control is proposed to achieve the synchronization,and the feedback control gain matrix is learned by iteratively solving an algebraic Riccati equation(ARE).For considering the attack cases,it is difficult to perform the stability analysis of the synchronization errors by using the existing Lyapunov function method due to the presence of unknown system matrices.In order to overcome this difficulty,a matrix polynomial replacement method is given and it is shown that,the proposed optimal control law can still guarantee the asymptotical convergence of synchronization errors if two inequality conditions related with the DoS attacks hold.Finally,two examples are given to illustrate the effectiveness of the proposed approaches. 展开更多
关键词 Algebraic Riccati equation(ARE) complex dynamical networks(CDNs) denial-of-service(DoS) secure control
下载PDF
A Systems-Theoretic Security Model for Large Scale, Complex Systems Applied to the US Air Transportation System 被引量:1
17
作者 Joseph R. Laracy 《International Journal of Communications, Network and System Sciences》 2017年第5期75-105,共31页
Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer fro... Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, socio-technical systems. A new approach is proposed in this paper that applies principles from control theory to enforce constraints on security threats thereby extending techniques used in system safety engineering. It is applied to identify and mitigate the threats that could emerge in critical infrastructures such as the air transportation system. Insights are provided to assist systems engineers and policy makers in securely transitioning to the Next Generation Air Transportation System (NGATS). 展开更多
关键词 Air TRANSPORTATION security Systems Engineering Control Theory SYSTEM dynamics
下载PDF
Hybrid Security Assessment Methodology for Web Applications 被引量:1
18
作者 Roddy A.Correa Juan Ramon Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio SiciliaMontalvo Manuel Sanchez Rubio A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期89-124,共36页
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment... This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks. 展开更多
关键词 Web applications security vulnerability WEAKNESS security analysis white box black box interactive application security testing static application security testing dynamic application security testing
下载PDF
基于WS-Security的安全动态电子商务 被引量:2
19
作者 樊时凯 周安民 《成都信息工程学院学报》 2005年第2期151-155,共5页
Web服务方式的动态电子商务是电子商务的最终目标,安全问题是制约动态电子商务实现的主要因素。在介绍了WS Security规范后,给出了一个建立动态电子商务的案例,分析了这个过程中可能面临的安全风险,提出了一种如何实现电子商务中重要的... Web服务方式的动态电子商务是电子商务的最终目标,安全问题是制约动态电子商务实现的主要因素。在介绍了WS Security规范后,给出了一个建立动态电子商务的案例,分析了这个过程中可能面临的安全风险,提出了一种如何实现电子商务中重要的机密性、完整性问题的方法。 展开更多
关键词 安全动态电子商务 WSsecurity SOAP PKI KERBEROS 电子财务接口
下载PDF
Dynamic Encryption and Secure Transmission of Terminal Data Files 被引量:1
20
作者 Ruchun Jia Yang Xin +1 位作者 Bo Liu Qin Qin 《Computers, Materials & Continua》 SCIE EI 2022年第4期1221-1232,共12页
Data is the last defense line of security,in order to prevent data loss,no matter where the data is stored,copied or transmitted,it is necessary to accurately detect the data type,and further clarify the form and encr... Data is the last defense line of security,in order to prevent data loss,no matter where the data is stored,copied or transmitted,it is necessary to accurately detect the data type,and further clarify the form and encryption structure of the data transmission process to ensure the accuracy of the data,so as to prevent data leakage,take the data characteristics as the core,use transparent encryption and decryption technology as the leading,and According to the data element characteristics such as identity authentication,authority management,outgoing management,file audit and external device management,the terminal data is marked with attributes to form a data leakage prevention module with data function,so as to control the data in the whole life cycle from creation,storage,transmission,use to destruction,no matter whether the data is stored in the server,PC or mobile device,provide unified policy management,form ecological data chain with vital characteristics,and provide comprehensive protection system for file dynamic encryption transmission,such as prevention in advance,control in the event,and audit after the event,so as to ensure the security of dynamic encryption in the process of file transmission,ensure the core data of the file,and help the enterprise keep away from the risk of data leakage. 展开更多
关键词 Terminal data data anti disclosure dynamic symmetric key dncryption algorithm secure transmission
下载PDF
上一页 1 2 80 下一页 到第
使用帮助 返回顶部