期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
网信安全政策动态
1
《电信工程技术与标准化》 2025年第4期78-80,共3页
【专栏介绍】《中华人民共和国国家安全法》规定,要“坚持总体国家安全观”,“统筹传统安全和非传统安全”。网信安全作为总体国家安全观中非传统安全的重要组成部分,与其他领域安全相互交融、相互影响。中国移动《网安观察》智库密切... 【专栏介绍】《中华人民共和国国家安全法》规定,要“坚持总体国家安全观”,“统筹传统安全和非传统安全”。网信安全作为总体国家安全观中非传统安全的重要组成部分,与其他领域安全相互交融、相互影响。中国移动《网安观察》智库密切追踪近期国内外网信安全政策法律动态、技术热点焦点,积极研判网络安全产业整体发展态势,提出相关建议,力求在网络安全领域提供有价值的信息参考。 展开更多
关键词 安观察智库 总体国家安全 网信安全
在线阅读 下载PDF
论在重大突发事件时基础电信企业的网信安全法律合规风险防范
2
作者 贵重 何瑛 刘畅 《电信工程技术与标准化》 2021年第3期17-19,共3页
随着信息通信技术的快速发展和广泛应用,基础电信企业在重大突发事件应对处置工作中发挥着越来越重要的作用。本文在全面梳理相关法律法规的基础上,从网信安全工作典型场景出发,开展专项调研与综合分析,围绕相关工作提出了具有可操作性... 随着信息通信技术的快速发展和广泛应用,基础电信企业在重大突发事件应对处置工作中发挥着越来越重要的作用。本文在全面梳理相关法律法规的基础上,从网信安全工作典型场景出发,开展专项调研与综合分析,围绕相关工作提出了具有可操作性的合规建议,为依法合规开展重大突发事件网信安全工作提供了有力支撑。 展开更多
关键词 重大突发事件 网信安全 法律合规风险防范
在线阅读 下载PDF
网信安全政策动态
3
作者 《电信工程技术与标准化》 2025年第5期42-44,共3页
一、网安聚焦:美国发布新政策指导联邦机构采购和使用人工智能2025年4月3日,美国白宫通过管理和预算办公室发布《通过创新、治理和公众信任加速联邦对人工智能的使用》(M-25-21)与《推动政府高效利用人工智能》(M-25-22)两份备忘录,并... 一、网安聚焦:美国发布新政策指导联邦机构采购和使用人工智能2025年4月3日,美国白宫通过管理和预算办公室发布《通过创新、治理和公众信任加速联邦对人工智能的使用》(M-25-21)与《推动政府高效利用人工智能》(M-25-22)两份备忘录,并取代拜登政府时期制定的两份有关政府使用和采购人工智能的备忘录,体现了特朗普政府强化人工智能领域主导地位的政策导向。 展开更多
关键词 网信安全政策 采购 联邦机构 人工智能
在线阅读 下载PDF
中国移动信息技术审计全覆盖实施模式研究 被引量:2
4
作者 刘巍 门烁 +1 位作者 庞博 孟伟滨 《中国内部审计》 2023年第6期56-60,共5页
中国移动总部内审部,通过探索“定方向、细指导、强控制、送技术、促整改”具体路径,开展信息技术审计项目全覆盖,形成两级内审机构监督合力,高效实现审计对象和关注内容的全面覆盖,促进审计工作价值和质量不断提升。
关键词 审计全覆盖 内部审计 网信安全
在线阅读 下载PDF
STUDY ON SEAMLESS AND MULTILEVEL VPN
5
作者 陈兵 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2002年第2期182-186,共5页
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ... The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control. 展开更多
关键词 network security virtual private network FIREWALLS
在线阅读 下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
6
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
在线阅读 下载PDF
The QoS of the Edge Router based on DiffServ 被引量:4
7
作者 Zhang Nan Mao Pengxuan +1 位作者 Xiao Yang Kiseon Kim 《China Communications》 SCIE CSCD 2009年第3期156-162,共7页
Internet real-time multimedia communication brings a further challenge to Quality of Service(QoS).A higher QoS in communication is required increasingly.As a new framework for providing QoS services,Differentiated Ser... Internet real-time multimedia communication brings a further challenge to Quality of Service(QoS).A higher QoS in communication is required increasingly.As a new framework for providing QoS services,Differentiated Services (DiffServ)is undergoing a speedily standardization process at the IETF.DiffServ not only can offer classified level of services,but also can provide guaranteed QoS in a certain extent.In order to provide QoS,DiffServ must be properly configured.The traditional DiffServ mechanism provides classifier for edge router to mark the different traffic streams,and then the core router uses different Drop Packet Mechanisms to drop packets or transmit data packets according to these classified markers.When multiple edge routers or other core routers transmit data packets high speedily to a single core router,the core router will emerge bottleneck bandwidth.The most valid solution to this problem is that the edge router adopts drop packet mechanism.This paper proposes an Modified Edge Router Mechanism that let the edge router achieve marking,dropping and transmitting packets of hybrid traffic streams based on DiffServ in a given bandwidth,the core router will only transmits packets but won’t drop packets.By the simulation of ns2,the modified mechanism ensure the QoS of high priority traffics and simplify the core router,it is a valid method to solve the congestion of the core router. 展开更多
关键词 DIFFSERV edge router mixed flows QOS
在线阅读 下载PDF
Achieve Personalized Anonymity Through Query Blocks Exchanging 被引量:13
8
作者 Chunguang Ma Lei Zhang +2 位作者 Songtao Yang Xiaodong Zheng Pinhui Ke 《China Communications》 SCIE CSCD 2016年第11期106-118,共13页
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency. 展开更多
关键词 cyberspace security location-based services collaborative users personalized anonymity query and location privacy
在线阅读 下载PDF
Network Security Incidents Frequency Prediction Based on Improved Genetic Algorithm and LSSVM 被引量:2
9
作者 ZHAO Guangyao ZOU Peng HAN Weihong 《China Communications》 SCIE CSCD 2010年第4期126-131,共6页
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici... Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents. 展开更多
关键词 Genetic Algorithm LSSVM Network Security Incidents Time Series PREDICTION
在线阅读 下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
10
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security Trusted Computing Direct Anonymous Attestation Trusted Domain.
在线阅读 下载PDF
From the Far Side of the Moon: Delay/DisruptionTolerant Networking Communications via Lunar Satellites 被引量:2
11
作者 Pietrofrancesco Apollonio Carlo Caini Vincenzo Fiore 《China Communications》 SCIE CSCD 2013年第10期12-25,共14页
Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates ... Delay/Disruption-Tolerant Networking(DTN) originated from research on Interplanetary Internet and still today space applications are the most important application field and research stimulus. This paper investigates DTN communications between the Earth and the far side of the Moon, by means of a lunar orbiter acting as relay. After an introductory part, the paper presents a comprehensive analysis of the DTN performance that can be achieved on the identified communication scenario. The focus is on the evaluation of the stateof-the-art ability of Interplanetary Overlay Network(ION), the NASA DTN implementation of Bundle Protocol(BP) and Contact Graph Routing(CGR), to meet the many challenges of the space communication scenario investigated(and more generally of a future interplaynetary Internet): intermittent links, network partitioning, scarce bandwidth, long delays, dynamic routing, handling of high priority and emergency traffic, interoperability issues. A study of security threats and Bundle Security Protocol(BSP) countermeasures complete the work.The many results provided, confirm the essential role of DTN in future space communications. 展开更多
关键词 DTN Earth to Moon communications interplanetary Interact satellite communications space communications
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部