期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
中波台安播信息系统数据库国产化替代研究
1
作者 杨子叶 《广播与电视技术》 2024年第11期64-68,共5页
在广电行业信息化建设中,确保信息安全和提升系统自主可控性至关重要。随着国产化技术的不断进步,采用国产化替代方案已成为广电行业信息化发展的必然趋势。本文对中波台安播信息系统及其数据库的应用现状进行了深入分析,并针对国产化... 在广电行业信息化建设中,确保信息安全和提升系统自主可控性至关重要。随着国产化技术的不断进步,采用国产化替代方案已成为广电行业信息化发展的必然趋势。本文对中波台安播信息系统及其数据库的应用现状进行了深入分析,并针对国产化替代过程中面临的挑战,提出了一系列切实可行的原则和策略。通过攻克技术难题,本文形成了一套完整的中波台安播信息系统数据库国产化替代方案,实现了核心数据库系统的全面自主可控,满足了广电行业信息化的信创需求。本研究不仅为广电行业内其他信息系统的国产化替代提供了实践指导,也为其他行业进行信息系统国产化改造提供了宝贵的经验和参考。 展开更多
关键词 国产数据库 信息系统 数据迁移 数据
在线阅读 下载PDF
《集散控制系统(DCS)安全管理标准》等五项信息安全标准工作组会议在深圳召开
2
《中国仪器仪表》 2015年第1期13-,共1页
<正>2014年12月2日,由全国工业过程测量控制和自动化标准化技术委员会(SAC/TC124)制定的推荐性国家标准GB/T 30976.1~2-2014《工业控制系统信息安全》(2个部分)在京发布,意味着我国自主的工业控制系统信息安全标准体系正在形成。... <正>2014年12月2日,由全国工业过程测量控制和自动化标准化技术委员会(SAC/TC124)制定的推荐性国家标准GB/T 30976.1~2-2014《工业控制系统信息安全》(2个部分)在京发布,意味着我国自主的工业控制系统信息安全标准体系正在形成。作为该标准体系的重要组成部分,2014年SAC/TC124还组织全国信息安全标准化技术委员会(TC260)、机械工业仪器仪表综合技术经济研究所、工业和信息化部电子技术标准化研究院、北京和利时系统工程有限公司、浙江大学、西南电力设计院、中国石油天然气管道工程有限公司。 展开更多
关键词 集散控制系统 DCS 全标准体系 信息全标准 工作组会议 工业过程测量 工业控制系统 系统信息安
在线阅读 下载PDF
简谈IDCISP信息安全管理系统升级改造
3
作者 陈敏 《广东通信技术》 2022年第8期6-8,共3页
阐述IDCISP信息安全管理系统整体架构、功能结构、系统部署,结合网络安全和数据安全新增功能需求,分析对现有系统升级改造的要求:IDC/ISP双向网络流量采集,信息安全监测和处置等基础功能,以及网络安全和数据安全的监测和处置等扩展功能。
关键词 SMMS全监管系统 ISMS信息全管理系统(简称信系统) 网络 数据 CU(控制单元) EU(执行单元)
在线阅读 下载PDF
曲径通幽 纵横本色——记成都三零盛安信息系统有限公司
4
作者 向永杨 《信息安全与通信保密》 2002年第11期30-32,共3页
避竞争、求融合,图合作.本篇讲述了成都三零盛安公司创业路上的惑与解惑,躁动与艰辛……或许.曲径中真有突破?!
关键词 成都三零盛信息系统有限公司 核心竞争力 信息全产业 网络 软件
原文传递
Novel method of enhancing the key amount for FH systems 被引量:1
5
作者 沈斐 宋铁成 +2 位作者 叶芝慧 刘彤 夏玮玮 《Journal of Southeast University(English Edition)》 EI CAS 2004年第4期412-417,共6页
Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation m... Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation methods were presented and the security performances were discussed theoretically. Firstly, the definitions of absolute and relative key amounts of FH systems, equal-interval and unequal-interval FH systems were given. Then, the absolute key amount and relative key amount were analyzed for equal-interval and unequal-interval FH systems. The results indicated that the absolute key amount had become the key point in improving the security and secrecy of FH systems, especially in today's epoch of highly developed computer science and IC design technology. Theoretical analysis and practical examples showed that the absolute key amount of unequal-interval FH systems was generally over two orders larger than that of equal-interval ones when spectrum overlapping was allowable. Therefore, there was great superiority in enhancing the security and secrecy for the scheme mentioned. 展开更多
关键词 Frequency shift keying Information theory Integrated circuits Security of data
在线阅读 下载PDF
Research on Assessment Model of Information System Security Based on Various Security Factors 被引量:5
6
作者 林梦泉 朱赟 +1 位作者 王强民 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第3期405-409,共5页
With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit... With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM. 展开更多
关键词 information system security factors five-attribute model(FAM) risk assessment
在线阅读 下载PDF
Security of earthquake disaster reduction system 被引量:2
7
作者 金波 陶夏新 +1 位作者 温瑞智 代志勇 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第6期642-644,共3页
No matter whether a system is operated manually or automatically controlled by computer, the system’s vulnerability always exists. Earthquake Disaster Reduction System (EDRS) belongs to the category of information sy... No matter whether a system is operated manually or automatically controlled by computer, the system’s vulnerability always exists. Earthquake Disaster Reduction System (EDRS) belongs to the category of information system. According to the features of security for EDRS, the steps and the methods on how to build the EDRS security were analyzed. The EDRS security features, security strategies and security measures were also given through a distributed EDRS skeleton that has been applied. Because there was still no appointed and authoritative agency or organization to certify and test EDRS security in China, a national information technology security certification center was introduced and suggested for the certification of the EDRS security. Finally, several discussions and tendencies for the EDRS development were presented. 展开更多
关键词 earthquake disaster reduction SECURITY DISTRIBUTED GIS (Geographic Information System)
在线阅读 下载PDF
Robust digital image watermarking against shearing based on Haar orthogonal function system 被引量:1
8
作者 DENGMing-hui HAOYan-ling SHENDong-hui 《Journal of Marine Science and Application》 2004年第1期75-80,共6页
In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogon... In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogonal function system to achieve the piece-based orthogonal transform on the image. The significant middle frequency coefficients in the transformation matrix are picked up, based on characteristics of the image visual system and the Haar orthogonal transform. The watermark is adoptively weighed to the middle frequency matrix. The method improves the validity of watermarking and shows excellent advantage against shearing attack. Experimental results show that the Haar orthogonal function system based watermark approach can provide an excellent protection under geometric attacks. 展开更多
关键词 digital watermarking Haar orthogonal function system shearing attack
在线阅读 下载PDF
A reference model for database security proxy 被引量:1
9
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
在线阅读 下载PDF
Sliding mode control for synchronization of chaotic systems with structure or parameters mismatching 被引量:3
10
作者 厉小润 赵辽英 赵光宙 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期571-576,共6页
This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form.... This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form. A feedback control for synchronizing two chaotic systems is proposed based on sliding mode control design. To make this controller physically realizable, an extended state observer is used to estimate the error between the transmitter and receiver. Two illustrative examples were carried out: (1) The Chua oscillator was used to show that synchronization was achieved and the message signal was recovered in spite of parametric variations; (2) Two second-order driven oscillators were presented to show that the synchronization can be achieved and that the message can be recovered in spite of the strictly different model. 展开更多
关键词 Chaos synchronization Sliding mode control Extended state observer Secure communication
在线阅读 下载PDF
Synthetic security assessment based on variable consistency dominance-based rough set approach 被引量:3
11
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2010年第4期413-421,共9页
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers... Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment. 展开更多
关键词 multi-attribute group decision-making (MAGDM) security assessment variable consistency dominance-based rough set approach (VC-DRSA)
在线阅读 下载PDF
Restricted common data in anonymous E-cash system 被引量:1
12
作者 张向军 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期595-600,共6页
Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficien... Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems. 展开更多
关键词 blind signatures ANONYMITY E-cash system restricted common data
在线阅读 下载PDF
Safety diagnosis on coal mine production system based on fuzzy logic inference 被引量:4
13
作者 王爽英 左红艳 《Journal of Central South University》 SCIE EI CAS 2012年第2期477-481,共5页
According to the randomness and uncertainty of information in the safety diagnosis of coal mine production system (CMPS), a novel safety diagnosis method was proposed by applying fuzzy logic inference method, which co... According to the randomness and uncertainty of information in the safety diagnosis of coal mine production system (CMPS), a novel safety diagnosis method was proposed by applying fuzzy logic inference method, which consists of safety diagnosis fuzzifier, defuzzifier, fuzzy rules base and inference engine. Through the safety diagnosis on coal mine roadway rail transportation system, the result shows that the unsafe probability is about 0.5 influenced by no speed reduction and over quick turnout on roadway, which is the most possible reason leading to the accident of roadway rail transportation system. 展开更多
关键词 coal mine production system safety diagnosis fuzzy logic inference
在线阅读 下载PDF
Information Security Service Support-Helping End-Users Cope with Security
14
作者 Rahul Rastogi Rossouw yon Solms 《Computer Technology and Application》 2011年第2期137-147,共11页
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor... Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service. 展开更多
关键词 Information security management information security service management (ISSM) service management informationsecurity service support (ISSS) service encounter.
在线阅读 下载PDF
The Information Security of Digital Control Systems for Nuclear Power Plants
15
作者 Nadir Mengazetdinov Alexey Poletykin Vitaly G. Promyslov 《Journal of Energy and Power Engineering》 2012年第5期744-754,共11页
The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper... The NPP (nuclear power plant) being vital objects of an energy infrastructure must be protected against malicious actions affecting their safety, and cyber security plays a key part in attaining this goal. The paper considers, implemented by the authors within the project of advanced digital control system for NPP with the reactor VVER-1000, a system of unauthorized access protection, partially built up on the technology of AA (active audit) and expert system. The AA technology is based on response of the system on deviation of current signature of the automated process control system from stable state rather than on a certain signature of attack and relies on the estimation of the behavioral models of the particular digital control system. The advent of active audit reflects the current situation in the digital control systems where complex distributed platforms are used to construct automated process control system. The active audit allows one to make the digital control system functionally closed, provided that it is determinate. The methodology of the active audit does not give u external (barrier) and traditional (password, antivirus) methods of unauthorized access protection. These methods can be used when it is appropriate to achieve a required protection level. 展开更多
关键词 SECURITY instrumentation and control system expert system nuclear plant.
在线阅读 下载PDF
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
16
作者 Stroie Elena Ramona 《Chinese Business Review》 2011年第12期1106-1110,共5页
Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, mana... Due to rapidly development of information systems, risk and security issues have increased and became a phenomenon that concerns every organization, without considering the size of it. To achieve desired results, managers have to implement methods of evaluating and mitigating risk as part of a process well elaborated. Security risk management helps managers to better control the business practices and improve the business process. An effective risk management process is based on a successful IT security program. This doesn't mean that the main goal of an organization's risk management process is to protect its IT assets, but to protect the organization and its ability to perform their missions. During this process, managers have to take into consideration risks that can affect the organization and apply the most suitable measures to minimize their impact. The most important task is choosing the best suited method for analyzing the existing risk properly. Several methods have been developed, being classified in quantitative and qualitative approaches of evaluating risk. The purpose of this paper is to present the advantages and disadvantages of each approach taking current needs and opportunities into consideration. 展开更多
关键词 risk management risk analysis risk assessment quantitative approach qualitative approach
在线阅读 下载PDF
Synthetic security assessment for incomplete interval-valued information system 被引量:1
17
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2012年第2期160-166,共7页
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec... In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified. 展开更多
关键词 security assessment incomplete interval-valued information system(IIIS) multi-attribute group decision-making(MAGDM) technique for order performance by similarity to ideal solution(TOPSIS) dominance- based rough set approach(DRSA) Gibbs sampling
在线阅读 下载PDF
Personal Delegation by Persona Creation
18
作者 Coimbatore S. Chandersekaran William R. Simpson 《Computer Technology and Application》 2011年第6期413-423,共11页
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ... There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required. 展开更多
关键词 DELEGATION enterprise information security least privilege ATTRIBUTION information sharing
在线阅读 下载PDF
Research and Application of Safety Information and Control System of Nuclear Power Station
19
作者 L.M. Zhang W.J. Huang Y.B. Sun G.J. Jiang 《Journal of Energy and Power Engineering》 2011年第12期1159-1162,共4页
The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and moni... The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and monitoring means to bring and maintain the plant in a safe state as a backup of main computerized control mean (MCM), in any plant conditions that are probable during a planed or unplanned unavailability of the MCM. The successful engineering applications of SICS in different digital I&C system platform are introduced in the paper. The thesis gives the research conclusion for new general SICS of digital I&C system. 展开更多
关键词 Safety information and control system back-up panel emergency control panel.
在线阅读 下载PDF
DEA-based Empirical Research on the Performance Analysis of China's Commercial Bank Information Security System Application
20
作者 Xinghua LU 《International Journal of Technology Management》 2013年第6期35-38,共4页
In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super... In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded. 展开更多
关键词 DEA Operating Performance Empirical Research
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部