期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
MIS系统用户安全性的研究与探讨 被引量:1
1
作者 朱伟 《抚顺石油学院学报》 2002年第4期44-58,共15页
随着计算机技术及Internet技术的不断发展 ,越来越多的企业把烦琐的数据处理业务通过MIS系统完成 ,进而实现快速、科学的管理。然而 ,计算机内信息往往因为安全措施不当遭到恶性破坏 ,使数据被更改或窃取 ,因此 ,要求MIS系统具有较高的... 随着计算机技术及Internet技术的不断发展 ,越来越多的企业把烦琐的数据处理业务通过MIS系统完成 ,进而实现快速、科学的管理。然而 ,计算机内信息往往因为安全措施不当遭到恶性破坏 ,使数据被更改或窃取 ,因此 ,要求MIS系统具有较高的安全性。在实际开发应用软件过程中如何把数据库安全性与应用程序安全性合理的联系在一起非常困难。对MSSQLServer2 0 0 0用户安全性进行了分析。在此基础上 ,探讨了利用存储过程使用建立安全机制和利用应用程序角色建立安全机制两种方案。 展开更多
关键词 MIS系统 用户安全性 研究 应用程序角色 存储过程
在线阅读 下载PDF
移动通信系统中的用户安全性
2
作者 孙鹏 《山东通信技术》 2003年第2期3-6,共4页
本文探讨了移动系统中用户层的安全问题。未来的移动电话用户将会越来越关心安全问题。
关键词 移动通信 用户安全性 网络安全 身份认证 密钥
在线阅读 下载PDF
ProTecTM PLuS主动式安全头枕
3
《汽车制造业》 2010年第14期54-54,共1页
李尔公司在为客户提供安全舒适的座椅方面一直处于业内领先地位,在提高用户安全性和满足新的安全要求的前提下,李尔的主动式安全头枕技术应运而生;主动式安全头枕技术是一个颈椎保护系统,它可以将颈椎损伤率降低43%,并且满足所有... 李尔公司在为客户提供安全舒适的座椅方面一直处于业内领先地位,在提高用户安全性和满足新的安全要求的前提下,李尔的主动式安全头枕技术应运而生;主动式安全头枕技术是一个颈椎保护系统,它可以将颈椎损伤率降低43%,并且满足所有的全球安全指标。 展开更多
关键词 安全舒适 主动式 头枕 PLUS 用户安全性 安全要求 保护系统 安全指标
在线阅读 下载PDF
数字视频的未来 被引量:1
4
作者 Gene A.Frantz 《电子产品世界》 2005年第10A期64-64,66,共2页
关键词 数字视频设备 数字视频技术 视频应用 用户安全性 半导体产品 操作可靠性 视频功能 视频系统 服务质量
在线阅读 下载PDF
捷尔杰多个产品系列闪耀2013德国Bauma展
5
作者 周春燕 《铁道建筑》 北大核心 2013年第5期160-160,共1页
在2013德国Bauma展上.作为全球领先的高空作业平台制造商,捷尔杰展出了旗下重量级产品。除了引以为傲的旗脱产品外,捷尔杰更带来了为提升用户安全性和便利性所研制的SkyGuard系统及终端APP,展现了捷尔杰在工程和技术上的不断创新和... 在2013德国Bauma展上.作为全球领先的高空作业平台制造商,捷尔杰展出了旗下重量级产品。除了引以为傲的旗脱产品外,捷尔杰更带来了为提升用户安全性和便利性所研制的SkyGuard系统及终端APP,展现了捷尔杰在工程和技术上的不断创新和孜孜追求。 展开更多
关键词 BAUMA展 德国 品系 高空作业平台 用户安全性 制造商 重量级 APP
在线阅读 下载PDF
Fluke公司车用万用表组合套件
6
《电子产品世界》 2005年第11B期54-55,共2页
Fluke公司推出Fluke 88V-IR车用万用表组合套件。集成了新型Fluke88V车用万用表和Raytek MiniTemp MT6红外车用温度计,该88V-IR套件还带有几乎可对任何传统或混合车辆进行故障排除和故障诊断的全套附件。专门为提高汽车故障排除应用中... Fluke公司推出Fluke 88V-IR车用万用表组合套件。集成了新型Fluke88V车用万用表和Raytek MiniTemp MT6红外车用温度计,该88V-IR套件还带有几乎可对任何传统或混合车辆进行故障排除和故障诊断的全套附件。专门为提高汽车故障排除应用中的可靠性和增加用户安全性而设计,Fluke88V车用万用表带有一个磁性把手,以便免手操作,并具有全套的汽车测试功能,包括最小值/最大值记录(每秒2.5亿次)、电导率、占空比、频率和脉冲宽度等高级功能。其内置数字温度计使专业人员不必更换工具即可测量和监测空气、表面或浸没温度。Fluke88V-IR套件现已供货,目录价格为559美元。 展开更多
关键词 Fluke公司 万用表 车用 套件 数字温度计 故障排除 用户安全性 故障诊断 混合车辆
在线阅读 下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
7
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
在线阅读 下载PDF
Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users 被引量:3
8
作者 Xiaofeng Feng Xinbo Gao Ru Zong 《China Communications》 SCIE CSCD 2017年第7期93-107,共15页
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single... In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation. 展开更多
关键词 cognitive radio networks cooperative jamming physical layer security spectrum sharing stackelberg game
在线阅读 下载PDF
Pseudo-Location Updating System for Privacy-Preserving Location-Based Services
9
作者 牛犇 朱晓妍 +1 位作者 池浩田 李晖 《China Communications》 SCIE CSCD 2013年第9期1-12,共12页
With the rapid development of location-aware devices such as smart phones,Location-Based Services(LBSs) are becoming increasingly popular. Users can enjoy convenience by sending queries to LBS servers and obtaining se... With the rapid development of location-aware devices such as smart phones,Location-Based Services(LBSs) are becoming increasingly popular. Users can enjoy convenience by sending queries to LBS servers and obtaining service information that is nearby.However, these queries may leak the users' locations and interests to the un-trusted LBS servers, leading to serious privacy concerns. In this paper, we propose a Privacy-Preserving Pseudo-Location Updating System(3PLUS) to achieve k-anonymity for mobile users using LBSs. In 3PLUS, without relying on a third party, each user keeps pseudo-locations obtained from both the history locations and the encountered users, and randomly exchanges one of them with others when encounters occur. As a result, each user's buffer is disordered. A user can obtain any k locations from the buffer to achieve k-anonymity locally. The security analysis shows the security properties and our evaluation results indicate that the user's privacy is significantly improved. 展开更多
关键词 pseudo-location K-ANONYMITY pri-vacy LBS
在线阅读 下载PDF
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
10
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
在线阅读 下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
11
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
在线阅读 下载PDF
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
12
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部