期刊文献+
共找到3,594篇文章
< 1 2 180 >
每页显示 20 50 100
Analysis of standardization of community security fund management-Taking practice of community security fund management in Wuhou district of Chengdu as an example
1
作者 Li Xiaowen Wen Jiahua +1 位作者 Wen Mengchuan Ren Yan 《China Standardization》 2024年第5期56-58,共3页
The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,su... The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance. 展开更多
关键词 community security funds management standardIZATION
下载PDF
Compilation Principles and Methods of China’s First Mongolian Standard in Meteorological Industry
2
作者 Ying Chun Yu Gang Han Yanli 《Meteorological and Environmental Research》 CAS 2019年第4期118-121,共4页
Mongolian Terms Commonly Used in Meteorological Services that was issued by the China Meteorological Administration is China s first traditional Mongolian standard in meteorological industry. In the process of formula... Mongolian Terms Commonly Used in Meteorological Services that was issued by the China Meteorological Administration is China s first traditional Mongolian standard in meteorological industry. In the process of formulation, the compilation unit fully complied with the principles of scientificity, practicability, universality and versatility, and used literal translation, free translation, and the combination of literal translation and free translation to translate and compile 71 mongolian terms commonly used in meteorological services. The standard fills the blank of standardization construction of basic traditional Mongolian language in the meteorological industry of China. 展开更多
关键词 METEOROLOGY MONGOLIAN language standard COMPILATION principleS and METHODS
下载PDF
The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises
3
作者 Ja’far Alqatawna 《Journal of Software Engineering and Applications》 2014年第10期883-890,共8页
The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. Th... The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organisations to evaluate and manage security by providing guidelines and best practices that enable them to follow a standard and systematic way to protect their e-Business activities. However, the suitability of available information security standards for Small and Medium e-Business Enterprises (e-SME) is worth further investigation. In this paper three major security standards including Common Criteria, System Security Engineering-Capability and Maturity Model and ISO/IEC 27001 were analysed. Accordingly, several challenges associated with these standards that may render them difficult to be implemented in e-SME have been identified. 展开更多
关键词 Information security standards E-BUSINESS Small and MEDIUM ENTERPRISES
下载PDF
Standardization Is Not Everything. Without Standardization, Nothing Can Be Done——Siemens Corporate Standardization Technical Regulation and Conformity Assessment Basic Principles
4
作者 By Wang Xu 《China Standardization》 2004年第4期34-39,共6页
关键词 BE standardization Is Not Everything Without standardization Siemens Corporate standardization Technical Regulation and Conformity Assessment Basic principles Basic Nothing Can Be Done
下载PDF
A simplified approach to the basic principle of security measures onboard ships
5
《交通建设与管理》 2004年第5期22-24,共3页
There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one... There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one ofthe greatest threats to ships and 展开更多
关键词 A simplified approach to the basic principle of security measures onboard ships
下载PDF
High Standard Capital Farmland Construction Based on Grain Security 被引量:1
6
作者 Zhi ZHANG Zhongxiang YU 《Asian Agricultural Research》 2016年第5期40-45,共6页
In the context that global grain security is still in very severe situation,the grain security situation in China is not optimistic as well. The " Red Line of Farmland Area" cannot completely solve the grain... In the context that global grain security is still in very severe situation,the grain security situation in China is not optimistic as well. The " Red Line of Farmland Area" cannot completely solve the grain security problems in China. We still need to seek new breakthroughs in the quality and yield of farmland. The construction of high standard capital farmland is the important premise to guarantee national grain security. On this basis,this paper has summarized the difficulties we are facing in the construction of high standard capital farmland,and has proposed the methods and measures to construct high standard capital farmland and lay a solid foundation for grain security in China. 展开更多
关键词 GRAIN securITY FARMLAND quality HIGH standard CAPITAL FARMLAND
下载PDF
Establishment of the Secure Channel between Broker Nodes in Pub/Sub System
7
作者 ZHU Shuren 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1441-1444,共4页
The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algo... The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algorithm between broker nodes in the routing process of the contentbased publish/subscribe system. It analyzes the security of the secure channel encrypted with data communication by DES algorithm and chaos code algorithm, and finds out the secure channel can be easily attacked by known plain text. Therefore, the paper proposes the improved algorithm of message encryption and authentication, combining encryption and the generation of the message authentication code together to finish scanning at one time, which enhances both the secure degree and running efficiency. This secure channel system has a certain reference value to the pub/sub system requiring highly communication security. 展开更多
关键词 PUBLISH/SUBSCRIBE routing algorithm subscription message secure channel data encryption standard (DES)
下载PDF
Emergence,Development and Evolution of Legal Attributes of Arm’s Length Principle 被引量:1
8
作者 Chen Chen 《学术界》 CSSCI 北大核心 2018年第5期270-281,共12页
关键词 长度 手臂 进化 开发 标准地 国际组织 定价 法律
下载PDF
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
9
作者 Ying Zheng 《Communications and Network》 2011年第4期225-228,共4页
To improve routing security in MPLS network, base on the stochastic routing algorithm, we propose a proactive mechanism we call enhanced secure heuristic-stochastic routing (ESHSR) , which brings to bear Bayesian prin... To improve routing security in MPLS network, base on the stochastic routing algorithm, we propose a proactive mechanism we call enhanced secure heuristic-stochastic routing (ESHSR) , which brings to bear Bayesian principle, explores the existence of multiple routes and forces packets to take alternate paths probabilistically. In this paper, we investigate game theoretic techniques to develop routing policies which make interception and eavesdropping maximally difficult. Through simulations, we validate our theoretical results and show how the resulting routing algorithms perform in terms of the security/delay/drop-rate, and we contrast them with the mechanism, secure stochastic routing (SSR). We observed that our scheme makes routing more secure than traditional secure stochastic routing, as they make use of the information of detecting the other side’s behavior. 展开更多
关键词 MPLS Network ROUTING security Game Theory Bayesian principle STOCHASTIC ROUTING
下载PDF
7th Cybersecurity Standardization Conference “European Standardization in support of the EU Legislation”
10
《China Standardization》 2022年第S01期58-58,共1页
February 7,Brussels,Belgium&virtual The European Standardization Organizations CEN,CENELEC and ETSI,are pleased to join forces with ENISA,the EU Agency for Cybersecurity,to organize the 7th Cybersecurity Standardi... February 7,Brussels,Belgium&virtual The European Standardization Organizations CEN,CENELEC and ETSI,are pleased to join forces with ENISA,the EU Agency for Cybersecurity,to organize the 7th Cybersecurity Standardization Conference"European Standardization in support of the EU Legislation".The 2023 programme of this well-recognized conference will have dedicated sessions on standardization activities in the areas related to the emerging EU legislation:proposed Cyber Resilience Act. 展开更多
关键词 security EUROPEAN standardIZATION
下载PDF
Roadmap to Future Mandatory Application of International Financial Reporting Standards (IFRS) in Japan From the Perspectives of Financial Statement Preparers
11
作者 Hu Dan Yao Jun 《Journal of Modern Accounting and Auditing》 2013年第3期335-347,共13页
This paper seeks to contribute to the discussion on the future mandatory application of Intemational Financial Reporting Standards (IFRS) using data from a questionnaire-based survey administered to financial statem... This paper seeks to contribute to the discussion on the future mandatory application of Intemational Financial Reporting Standards (IFRS) using data from a questionnaire-based survey administered to financial statement preparers, that is, management in Japan. The important findings of this paper are as follows. The majority of Japanese companies consider that the domestic markets are more important than overseas markets; the most important differences between IFRS and Japanese standards are goodwill, comprehensive income, and the recognition of revenue; it is expected that IFRS would be applied only in consolidated financial statements or in both consolidated and parent companies' separate financial statements; and the lack of legislation making it mandatory is the main reason why IFRS has not been adopted by Japanese companies. Overall, this paper found that Japanese management is prudent and passive regarding IFRS adoption, leaving room for further discussions on the future mandatory application of IFRS in Japan. 展开更多
关键词 International Financial Reporting standards (IFRS) Japanese Generally Accepted Accounting principles (GAAP) convergence
下载PDF
Public Security Risk m Large Scale Activities and the Standardization Prospects
12
作者 Xiong Fei,Ma Na Yan Shaoqing research center or Shanghai Institute of Standardization. senior engineer,director or research center of standardization,Shanghai Institute of Standardization,secretary general of SAC/TC 269/SC 3 on third party logistics service,secretary general of SAC/TC 234/SC 1 on project management maturity assessment, 《China Standardization》 2010年第5期31-38,共8页
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ... This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China. 展开更多
关键词 Large Scale Activities Public security standardIZATION
下载PDF
‘Disciplining Oneself’and‘Disciplining Others’in Social Life:On the Contemporary Significance of Confucius’s Principle of Loyalty and Reciprocity
13
作者 Xu Qi 《孔学堂》 2020年第3期I0042-I0048,共7页
In a moral sense,there is an essential di erence between“disciplining oneself”and“disciplining others”in that the former means one setting rules for and giving orders to oneself in regard to one’s own conduct,whi... In a moral sense,there is an essential di erence between“disciplining oneself”and“disciplining others”in that the former means one setting rules for and giving orders to oneself in regard to one’s own conduct,which are unconditionally compulsory,while the latter is exible in the sense that one’s rules and orders for oneself are not compulsory to others and cannot prohibit others from doing something.In principle,Confucius’s sayings,“do not impose upon others that which you would not wish for yourself”and“establish others in seeking to establish yourself and promote others in s eeking to promote yourself”have epitomized the line of demarcation between them.His doctrine of“not imposing upon others that which you would not wish for yourself,”though based on self-preservation and self-interest,represents a standard of conduct of highly universal value.If the overwhelming majority of a society follows it as their standard of conduct,refraining from harming others in order to protect oneself from harm,then the whole society will endure little,if not no,strife and struggle. 展开更多
关键词 disciplining oneself disciplining others principle of loyalty and reciprocity moral standard refraining from action
下载PDF
Generalized Lob’s Theorem.Strong Reflection Principles and Large Cardinal Axioms
14
作者 J.Foukzon E.R.Men’kova 《Advances in Pure Mathematics》 2013年第3期368-373,共6页
In this article, a possible generalization of the Lob’s theorem is considered. Main result is: let κ be an inaccessible cardinal,
关键词 Lob’s Theorem Second Godel Theorem CONSISTENCY Formal System Uniform Reflection principles ω-Model of ZFC standard Model of ZFC Inaccessible Cardinal
下载PDF
Development of the Principle of International Solidarity and the Contribution of China
15
作者 武文扬 CHEN Feng(译) 《The Journal of Human Rights》 2020年第3期394-409,共16页
International solidarity is a fundamental value upheld by the united nations as well as a principle of international law recognized by independent experts on human rights The values and principle of international soli... International solidarity is a fundamental value upheld by the united nations as well as a principle of international law recognized by independent experts on human rights The values and principle of international solidarity have played an important role in promoting human rights, improving the international economic order, driving sustainable development, and tackling global challenges, and they have gained wide support from most developing countries As unilateralism and protectionism continue to spread, global governance and multilateral cooperation are under threat Against this background, the united nations calls for the spirit and principle of international solidarity and the promotion of solidarity rights, including the right to development, and encourages the countries to safeguard global public health through joint actions and to avoid discrimination The concept of a community with a shared future for human beings proposed by China embodies international cooperation, mutual learning and exchanges, and collective efforts to promote and safeguard human rights It has made a positive contribution to enriching and boosting the principle of international solidarity and demonstrated the wisdom and responsibility of China as a major country. 展开更多
关键词 principle of international solidarity solidarity rights right to development community with a shared future for human beings global public health security
下载PDF
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
16
作者 Maryam Roshanaei Mahir R. Khan Natalie N. Sylvester 《Journal of Information Security》 2024年第3期320-339,共20页
The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cyber... The landscape of cybersecurity is rapidly evolving due to the advancement and integration of Artificial Intelligence (AI) and Machine Learning (ML). This paper explores the crucial role of AI and ML in enhancing cybersecurity defenses against increasingly sophisticated cyber threats, while also highlighting the new vulnerabilities introduced by these technologies. Through a comprehensive analysis that includes historical trends, technological evaluations, and predictive modeling, the dual-edged nature of AI and ML in cybersecurity is examined. Significant challenges such as data privacy, continuous training of AI models, manipulation risks, and ethical concerns are addressed. The paper emphasizes a balanced approach that leverages technological innovation alongside rigorous ethical standards and robust cybersecurity practices. This approach facilitates collaboration among various stakeholders to develop guidelines that ensure responsible and effective use of AI in cybersecurity, aiming to enhance system integrity and privacy without compromising security. 展开更多
关键词 Artificial Intelligence Machine Learning CYBERsecurITY Data Privacy and security Ethical standards
下载PDF
关于在LAN环境中应用IEEE 802.1X Standard的安全性分析 被引量:3
17
作者 赖炜 钱骏 《现代计算机》 2003年第4期51-53,87,共4页
本文对在LAN环境中实施IEEE802.1X协议的安全性作了一个初步的分析,并着重研究了基于802.11协议的无线网与802.1X协议的结合应用。在此基础上,分析了IEEE802.1X Standard内在的安全缺陷,提出了相应的解决方法。
关键词 LAN 局域网 计算机网络 IEEE802.1X协议 安全性
下载PDF
ISO/IEC 27000, 27001 and 27002 for Information Security Management 被引量:3
18
作者 Georg Disterer 《Journal of Information Security》 2013年第2期92-100,共9页
With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT... With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security [1]. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures. 展开更多
关键词 securITY standards ISO/IEC 27000 ISO 27001 ISO 27002 ISO 27 K
下载PDF
A Cloud Computing Security Assessment Framework for Small and Medium Enterprises 被引量:1
19
作者 Satwinder Singh Rupra Amos Omamo 《Journal of Information Security》 2020年第4期201-224,共24页
Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum servic... Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value. 展开更多
关键词 Cloud Computing FRAMEWORK SME securITY standards
下载PDF
Network Security in Remote Supervisory Control
20
作者 Huang Zhenguo(黄振国) 《Journal of Donghua University(English Edition)》 EI CAS 2001年第1期120-122,共3页
After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end pro... After an introduction to the implementation of supervisory computer control (SCC) through networks and the relevant security issues, this paper centers on the core of network security design: intelligent front-end processor (FEP), encryption/decryption method and authentication protocol. Some other system-specific security measures are also proposed. Although these are examples only, the techniques discussed can also be used in and provide reference for other remote control systems. 展开更多
关键词 REMOTE supervisory control network security frontend PROCESSOR ( FEP ) data ENCRYPTION standard ( DES ) authentication.
下载PDF
上一页 1 2 180 下一页 到第
使用帮助 返回顶部