期刊文献+
共找到633篇文章
< 1 2 32 >
每页显示 20 50 100
Analysis of Secured Cloud Data Storage Model for Information
1
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD DATA information Model Data storage Cloud Computing Security system Data Encryption
在线阅读 下载PDF
ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems
2
作者 CHEN Zhao YAO Wenbin XIAO Da WU Chunhua LIU Jianyi WANG Cong 《China Communications》 SCIE CSCD 2010年第4期89-95,共7页
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente... The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing. 展开更多
关键词 Distributed system secure storage information Dispersal knight's tour problem
在线阅读 下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical systems Critical Infrastructure Data Protection privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
4
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
5
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 information security data privacy epidemic prevention and control personal privacy protection
在线阅读 下载PDF
Enhanced Information Systems Success Model for Patient Information Assurance
6
作者 Lilian Adhiambo Agunga Joshua Agola Paul Abuonji 《Journal of Computer Science Research》 2021年第4期31-42,共12页
The current health information systems have many challenges such as lack of standard user interfaces,data security and privacy issues,inability to uniquely identify patients across multiple hospital information system... The current health information systems have many challenges such as lack of standard user interfaces,data security and privacy issues,inability to uniquely identify patients across multiple hospital information systems,probable misuse of patient data,high technological costs,resistance to technology deployments in hospital management,lack of data gathering,processing and analysis standardization.All these challenges,among others hamper either the acceptance of the health information systems,operational efficiency or expose patient information to cyber attacks.In this paper,an enhanced information systems success model for patient information assurance is developed using an amalgamation of Technology Acceptance Model(TAM)and Information Systems Success Model(ISS).This involved the usage of Linear Structured Relationship(LISREL)software to model a combination of ISS and Intention to Use(ITU),TAM and ITU,ISS and user satisfaction(US),and finally TAM and US.The sample size of 110 respondents was obtained based on the total population of 221 using the Conhrans formula.Thereafter,simple random sampling was employed to select members within each category of employees to take part in the study.The questionnaire as a research tool was checked for reliability via Cronbach’s Alpha.The results obtained showed that for ISS and ITU modeling,only perceived ease of use,system features,response time,flexibility,timeliness,accuracy,responsiveness and user training positively influenced the intention to use.However,for the TAM and ITU modeling,only TAM’s measures such as timely information,efficiency,increased transparency,and proper patient identification had a positive effect on intension to use.The ISS and US modeling revealed that perceived ease of use had the greatest impact on user satisfaction while response time had the least effect on user satisfaction.On its part,the TAM and US modeling showed that timely information,effectiveness,consistency,enhanced communication,and proper patients identification had a positive influence on user satisfaction. 展开更多
关键词 information assurance ISS Modeling privacy SECURITY TAM User satisfaction
在线阅读 下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
7
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information Protection Law privacy security privacy protection will
在线阅读 下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
8
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
在线阅读 下载PDF
A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
9
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Xin Liu Xiu-Bo Chen Yiying Yu Xiaojun Wang 《Computers, Materials & Continua》 SCIE EI 2022年第9期5429-5441,共13页
With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.Howe... With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search(PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further,the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly,we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result,which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least,through security analysis,our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others. 展开更多
关键词 Lattice cryptography searchable encryption blockchain privacy protection log system information security applied cryptography
在线阅读 下载PDF
Data Security and Privacy in Cloud Storage
10
作者 Xinhua Dong Ruixuan Li +2 位作者 Wanwan Zhou Dongjie Liao Shuoyi Zhao 《ZTE Communications》 2013年第2期18-23,共6页
In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and ... In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and security of data stored in the cloud. We discuss policies for access control and data integrity, availability, and privacy. We also discuss several key solutions proposed in current literature and point out future research directions. 展开更多
关键词 cloud storage cloud computing data security privacy-PRESERVING
在线阅读 下载PDF
A secure double spectrum auction scheme
11
作者 Jiaqi Wang Ning Lu +2 位作者 Ziyang Gong Wenbo Shi Chang Choi 《Digital Communications and Networks》 CSCD 2024年第5期1415-1427,共13页
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum resources.Spectrum auctions came into being,which can effectively utilize spectrum resources.... With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum resources.Spectrum auctions came into being,which can effectively utilize spectrum resources.Because of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be guaranteed.Most scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and buyers.Researchers begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction rules.But these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this paper.Unlike traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum auctions.In addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum auctions.Finally,security analysis and performance evaluation of our protocol are discussed. 展开更多
关键词 secure double spectrum auction SGX technology privacy information Ethereum platform VERIFICATION
在线阅读 下载PDF
DNA数据存储技术的法律治理议题
12
作者 焦洪涛 齐蒙 +1 位作者 邵滨 蒋劲松 《合成生物学》 北大核心 2025年第1期177-189,共13页
DNA数据存储技术是合成生物学的关键分支领域,以其存储密度高、存储时期长、稳定、安全等特点,有望成为当下数据爆炸式增长导致存储能力不足的解决方案。DNA数据存储技术的快速发展为现行法律体系带来冲击,探讨DNA数据存储技术的法律治... DNA数据存储技术是合成生物学的关键分支领域,以其存储密度高、存储时期长、稳定、安全等特点,有望成为当下数据爆炸式增长导致存储能力不足的解决方案。DNA数据存储技术的快速发展为现行法律体系带来冲击,探讨DNA数据存储技术的法律治理议题是强化新兴科技伦理治理的重要内容。在人权层面,探讨可能引发的对“人的尊严”的挑战和数据鸿沟问题,建议完善DNA数据存储基于科技伦理治理框架上的政策法律体系;在安全层面,探讨可能引发的信息安全和生物安全相关问题,建议结合信息安全和生物安全两个维度强化DNA数据存储技术的安全治理;在知识产权层面,探讨DNA合成和测序技术、DNA介质以及重组DNA的微生物中涉及的可专利性等问题,建议完善专利保护规则,优化知识产权法治环境,以促进DNA数据存储技术科技创新和产业创新。 展开更多
关键词 DNA数据存储技术 合成生物学 信息安全 法律治理 科技伦理治理
在线阅读 下载PDF
数智时代App收集个人信息的安全风险与法律应对
13
作者 徐伟 李文敏 《山东行政学院学报》 2025年第1期113-121,共9页
随着信息共享加速,App违反告知同意规则、超范围收集、欺骗诱导、强制索权及隐私政策不透明等损害个人信息权益的现象频发,然而当前App个人信息收集的风险规制存在着立法保护滞后、行政监管乏力和司法救济阻塞的问题。我们应强化立法保... 随着信息共享加速,App违反告知同意规则、超范围收集、欺骗诱导、强制索权及隐私政策不透明等损害个人信息权益的现象频发,然而当前App个人信息收集的风险规制存在着立法保护滞后、行政监管乏力和司法救济阻塞的问题。我们应强化立法保护,完善现有法律法规,细化个人信息保护的具体条款,以实现更有效的规制;推动监管部门协作配合,建立跨部门协调机制,加强信息共享和风险响应能力建设,确保监管行动的统一性和连贯性;优化司法救济路径,调整侵权案件的举证规则,放宽被侵权者的举证要求,并扩充公益诉讼的适用条件,以更好地保障个人权益。 展开更多
关键词 App收集个人信息 信息安全 个人信息保护 隐私保护 风险规制
在线阅读 下载PDF
面向层面部署的云存储网络信息安全保障系统设计
14
作者 陈贵兰 《山西电子技术》 2025年第2期4-6,9,共4页
为了提高学术信息资源存储效率,设计了一种面向层面部署的云存储网络信息安全保障系统。从各个层面部署云存储网络信息安全架构,安全保障系统能满足云存储网络信息的安全性。研究结果表明:访问控制可有效避免非授权使用数据资源类似,数... 为了提高学术信息资源存储效率,设计了一种面向层面部署的云存储网络信息安全保障系统。从各个层面部署云存储网络信息安全架构,安全保障系统能满足云存储网络信息的安全性。研究结果表明:访问控制可有效避免非授权使用数据资源类似,数据资源从应用程序授权采集并进行存储。采取多租户模式隔离时云存储过程安全问题可通过多租户管理得到有效解决。在云存储系统中安全移植学术信息资源并按照标准化格式导出。对不同类别的学术信息资源精确检测,对某些涉密信息或知识版权采取加入水印标记或者禁止复制方法进行保护。基于此,从安全保障设计角度对云存储网络信息相关内容展开全面且深入分析和研究,有利于长效保障云存储网络信息安全。 展开更多
关键词 学术信息资源 云存储 安全保障系统 安全保障设计
在线阅读 下载PDF
基于改进Blowfish的用户隐私信息存储加密方法
15
作者 刘忠铁 《电子设计工程》 2025年第4期6-9,16,共5页
在用户信息的管理中,由于涉及大量敏感和隐私数据,未经授权的访问将严重威胁用户数据的安全。为此,提出基于改进Blowfish算法的用户隐私信息存储与加密方法。遵循Blowfish算法的改进和优化原则,深入挖掘用户数据中的隐私信息,并设计相... 在用户信息的管理中,由于涉及大量敏感和隐私数据,未经授权的访问将严重威胁用户数据的安全。为此,提出基于改进Blowfish算法的用户隐私信息存储与加密方法。遵循Blowfish算法的改进和优化原则,深入挖掘用户数据中的隐私信息,并设计相应的隐私信息密钥模板。利用这一密钥模板,规划隐私信息的加密策略,构建隐私信息存储机制,确保用户数据的访问和操作受到严格限制。实验结果表明,该方法实现了对特定隐私信息的精细化控制,确保只有授权的数据主机能够访问这些信息,从而有效防止了未授权访问的风险。 展开更多
关键词 改进Blowfish算法 用户隐私信息 存储加密 密钥模板 数据授权
在线阅读 下载PDF
深入敏感值评估的隐私度量分级模型
16
作者 谢思琪 田秀霞 《计算机工程与设计》 北大核心 2025年第3期756-761,共6页
为对数据的隐私等级进行细致化评定,探求同一类型敏感属性下不同敏感值之间的差异,提出一种深入敏感值评估的隐私度量分级模型。以信息熵为度量,通过考虑敏感值的泛化程度、语义敏感度、句法结构3方面的影响,对数据集中各个敏感因素进... 为对数据的隐私等级进行细致化评定,探求同一类型敏感属性下不同敏感值之间的差异,提出一种深入敏感值评估的隐私度量分级模型。以信息熵为度量,通过考虑敏感值的泛化程度、语义敏感度、句法结构3方面的影响,对数据集中各个敏感因素进行定权计算得到记录的隐私度量向量,输入到分类器中进行分级。实验结果表明,该模型在结构化数据集和短文本数据集中都能实现无需预定义权重的敏感数据分级,准确度分别为94.17%和87.84%。 展开更多
关键词 敏感值评估 数据分级 信息熵 敏感信息识别 敏感数据管理 信息安全 依存句法分析
在线阅读 下载PDF
档案信息化管理中数据安全与隐私保护的研究
17
作者 李娇 《科学与信息化》 2025年第7期181-183,共3页
随着信息技术的快速发展,档案信息化管理愈发关键。然而,数据安全和隐私保护问题成为其发展的瓶颈。本文强调了数据安全与隐私保护在档案信息化管理中的重要性,并剖析了技术漏洞、管理不足及法律空白等挑战。为应对这些挑战,提出强化技... 随着信息技术的快速发展,档案信息化管理愈发关键。然而,数据安全和隐私保护问题成为其发展的瓶颈。本文强调了数据安全与隐私保护在档案信息化管理中的重要性,并剖析了技术漏洞、管理不足及法律空白等挑战。为应对这些挑战,提出强化技术防护、完善制度、加强人员培训等对策。这些措施将提升档案信息化管理的数据安全与隐私保护水平,为未来的档案工作提供重要参考。 展开更多
关键词 档案信息化管理 数据安全 隐私保护 信息技术 风险管理
在线阅读 下载PDF
智慧城市建设中的信息化基础设施规划与实施研究
18
作者 周新求 《数字通信世界》 2025年第2期195-197,共3页
在智慧城市构建中,信息安全与隐私保护至关重要。本文聚焦网络安全基础设施、数据加密、访问控制及隐私保护机制,通过应用数据加密、分层访问等技术,防范网络攻击与数据泄露,保障市民隐私,助力城市管理高效,为智慧城市信息安全提供指导。
关键词 智慧城市 信息安全 网络安全 数据加密 隐私保护
在线阅读 下载PDF
基于双聚类算法的网络隐私信息安全加密传输方法研究
19
作者 吴让乐 邵慧 +1 位作者 窦蕴韬 刘钘 《信息与电脑》 2025年第1期95-97,共3页
为提高网络隐私信息传输的安全性与机密性,文章提出了利用双聚类算法的网络隐私信息安全加密传输方法。基于双聚类算法,构建网络隐私信息索引矩阵,为信息加密传输提供支持;设计信息加密算法,确保每个元素都能被安全地转换为无法直接识... 为提高网络隐私信息传输的安全性与机密性,文章提出了利用双聚类算法的网络隐私信息安全加密传输方法。基于双聚类算法,构建网络隐私信息索引矩阵,为信息加密传输提供支持;设计信息加密算法,确保每个元素都能被安全地转换为无法直接识别的密文形式。文章设计了基于DFT-S-OFDM技术的加密信号传输机制,通过构建特定的发送及接收模型,实现了对加密后的网络隐私信息索引矩阵的安全传输。实验结果显示,采用该方法后,其防御攻击的能力稳定在98%以上的高水平区间,能够有力应对多种攻击类型,确保信息数据的安全。 展开更多
关键词 双聚类算法 网络隐私 信息安全 加密传输
在线阅读 下载PDF
酒店业数字化应用的数据伦理研究——基于共享价值创造理论
20
作者 陈子燕 杨永彪 《商业观察》 2025年第4期29-33,共5页
文章探讨了酒店行业在数字化进程中采用大数据、云计算、IoT、AI等技术带来的服务升级及随之产生的数据伦理问题,尤其是个人隐私保护与信息安全问题。文章对ZHZ酒店运营平台的产品能力进行实例分析,揭示了消费者对个人信息授权和人脸采... 文章探讨了酒店行业在数字化进程中采用大数据、云计算、IoT、AI等技术带来的服务升级及随之产生的数据伦理问题,尤其是个人隐私保护与信息安全问题。文章对ZHZ酒店运营平台的产品能力进行实例分析,揭示了消费者对个人信息授权和人脸采集等涉及隐私环节的担忧与使用影响。文章指出酒店行业应协同消费者和技术服务商,确保数据使用合规透明,并提出酒店行业需加强员工数据伦理教育、重视数据伦理专业人才培养及增加数据伦理治理的投入,以保障数据安全,推动酒店行业成功实施数字化转型。 展开更多
关键词 酒店数字化 数据伦理 信息伦理 隐私保护 信息安全
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部