期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Security Technology of E-commence——Intelligent Packet-filtering Firewalls
1
作者 WU Jin-lin 1, WU Qing-fen 2 (1. Computer Science Department, Xiamen University, Xiamen 361005, Chi na 2. Computer Science Department, Harbin University of Science and Technology, H arbin 150080, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期277-,共1页
Research has revealed that, in the next ten to twen ty years, the implementation of E-commence will become a new basis of economic in crease of China and other countries in the world. And the essence of implementin g ... Research has revealed that, in the next ten to twen ty years, the implementation of E-commence will become a new basis of economic in crease of China and other countries in the world. And the essence of implementin g E-commerce is the credit standing among the banks, the sellers and the custom ers. But the credit standing in the net ultimately depends on the security of th e network. Firewall is a useful network security technology to keep a network fr om being intruded. The rational use of firewalls can strengthen the security of the E-commence system. Traditional package-filtering firewalls usually rej ect the illegal accesses and admit the legal accesses according to filtering pol icy established by the administrator in advance. But the measures of attacking n etworks are increasing, so ACL (access control list) that is established in adva nce can hardly meet the needs of the rapid development of the network. And the r eal-time quality and sensitivity of traditional firewalls are not satisfied. No w a new model of implementing the expert system to the management of network sec urity is brought forward. The focus of the intelligent packet-filtering firewal l lies on the expert system. The tight combination of expert system and the filt ering method can realize the efficient detection and control of the packages tha t flow through the firewall system. By using the intelligent firewall, the secur ity of the E-commence can be strengthened indeed. 展开更多
关键词 firewall ES E-COMMERCE ACL
在线阅读 下载PDF
网络安全可视化产品的求同存异——产品经理看RSA大会
2
作者 李远 《信息安全研究》 2017年第3期281-288,共8页
随着网络安全可视化技术的发展,业界厂商逐渐形成以整网路径、设备运维和安全策略为3个维度的不同阵营。当越来越多的业务迁移到云计算和数据中心场合时,不同的厂商走向了不同的技术路线,却也存在部分共同的思路。本文通过对最新发布产... 随着网络安全可视化技术的发展,业界厂商逐渐形成以整网路径、设备运维和安全策略为3个维度的不同阵营。当越来越多的业务迁移到云计算和数据中心场合时,不同的厂商走向了不同的技术路线,却也存在部分共同的思路。本文通过对最新发布产品的分析,阐述不同厂商的异同,并分析网络安全可视化领域的发展趋势。 展开更多
关键词 网络安全 RSA 可视化分析 安全域 策略管理 中国制造 firewall 数据中心 威胁分析 工作流
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部