期刊文献+
共找到92,754篇文章
< 1 2 250 >
每页显示 20 50 100
公路生命安全防护工程设施选用经济性分析——以G312无锡段为例 预览
1
作者 俞迪 《城市道桥与防洪》 2019年第5期197-199,202,M0021-M0022共5页
各地相继开展了公路生命安全防护工程,提高了公路安全保障水平,强化了公路安全基础,改善了公路交通安全环境,但关于生命安全防护工程的设施选用,特别是从经济角度如何选用的研究相对匮乏。以G312无锡段为例,阐述交通安全设施选用原则,... 各地相继开展了公路生命安全防护工程,提高了公路安全保障水平,强化了公路安全基础,改善了公路交通安全环境,但关于生命安全防护工程的设施选用,特别是从经济角度如何选用的研究相对匮乏。以G312无锡段为例,阐述交通安全设施选用原则,对交通标志反光膜和道路交通标线两种设施进行了经济性量化分析,为公路生命安全防护工程的实施提供理论依据。 展开更多
关键词 公路 安全 生命安全防护工程 交通安全设施 经济分析
在线阅读 下载PDF
放射性物质个体自主安全智能 预览
2
作者 阳小华 曾铁军 +3 位作者 万亚平 刘征海 毛宇 胡杰 《核安全》 2019年第2期43-48,共6页
当前放射性物质主要依靠入侵报警系统、视频监控系统和出入口控制系统等外部手段来保障安全。当面临低空、水下等安全威胁或系统故障导致外部安保系统失效时,放射性物质将失去安全保障,致使放射性物质发生丢失或被盗等核安全事件。本文... 当前放射性物质主要依靠入侵报警系统、视频监控系统和出入口控制系统等外部手段来保障安全。当面临低空、水下等安全威胁或系统故障导致外部安保系统失效时,放射性物质将失去安全保障,致使放射性物质发生丢失或被盗等核安全事件。本文提出放射性物质个体自主安全智能的概念,赋予放射性物质感知和应对自身所面临危险的能力;提出内在安全智能与外在安保能力相结合的安保级别划分,为满足不同类型的放射性物质安全性需求提供新的实现方式。 展开更多
关键词 放射性物质 安保 自主安全智能 安保级别
在线阅读 下载PDF
从共存安全到共生安全:基于边境安全特殊性的思考 预览
3
作者 刘雪莲 欧阳皓玥 《国际安全研究》 CSSCI 北大核心 2019年第2期3-23,156共22页
边境地区作为国家领土比较特殊的组成部分,代表着国家主权的至高无上性和国家领土的不容侵犯。过去,位于国家交界处的边境地区敏感脆弱,承担着维护国家“安全”和“生存”的重任,传统边境始终发挥其屏蔽功能,传统的边境安全随之体现出... 边境地区作为国家领土比较特殊的组成部分,代表着国家主权的至高无上性和国家领土的不容侵犯。过去,位于国家交界处的边境地区敏感脆弱,承担着维护国家“安全”和“生存”的重任,传统边境始终发挥其屏蔽功能,传统的边境安全随之体现出“防范危险”和“共存安全”的主要特性。如今,由于全球化进程和国家的开放政策,相应地引发了实体边界弱化和“软边界”扩散等边境地区的新变化,同时,边境屏蔽效应相对减弱,中介效应凸显,使边境地区呈现安全与发展并举甚至以发展为主导的安全态势,边境安全的特征发生重大转变。边境地区安全问题的复杂化、安全的渗透性和联动性增强、安全中注入发展的因素以及安全的社会化建构等特征与“共生”理论中的多元性、内生性、交互性、共生性等特征相似,而且有相适应的研究议题,使边境安全问题可以从共生视角进行探讨。边境安全的变化使边境在实现“共存安全”的同时强调“共生安全与发展”,在关注当下安全的同时也注重安全的未来。文章以边境安全的特殊性为视角进行研究,提出“共生安全”的新理念,并在“共存安全”和“共生安全”特性的比较中,探索边境安全乃至国家安全的未来走向。 展开更多
关键词 安全 边境安全 共存安全 共生安全 国际安全理论
在线阅读 下载PDF
A Survey: Typical Security Issues of Software-Defined Networking 预览
4
作者 Yifan Liu Bo Zhao +2 位作者 Pengyuan Zhao Peiru Fan Hui Liu 《中国通信:英文版》 SCIE CSCD 2019年第7期13-31,共19页
Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmab... Software-Defined Networking (SDN) has been a hot topic for future network development, which implements the different layers of control plane and data plane respectively. Despite providing high openness and programmability, the “three-layer two-interface” architecture of SDN changes the traditional network and increases the network attack nodes, which results in new security issues. In this paper, we firstly introduced the background, architecture and working process of SDN. Secondly, we summarized and analyzed the typical security issues from north to south: application layer, northbound interface, control layer, southbound interface and data layer. Another contribution is to review and analyze the existing solutions and latest research progress of each layer, mainly including: authorized authentication module, application isolation, DoS/DDoS defense, multi-controller deployment and flow rule consistency detection. Finally, a conclusion about the future works of SDN security and an idealized global security architecture is proposed. 展开更多
关键词 software-defined NETWORKING network SECURITY global SECURITY SECURITY THREAT
在线阅读 下载PDF
“安全化”还是“安全议程化” 预览
5
作者 刘跃进 《山西师大学报:社会科学版》 2019年第5期40-44,共5页
汉语"安全化"一词,早在20世纪五六十年代就已存在,基本含义是"使变得安全",即"由不安全变得安全",指向的是由不安全变得安全的客观过程。20世纪90年代后期,我国学者在翻译介绍以巴瑞·布赞为代表的... 汉语"安全化"一词,早在20世纪五六十年代就已存在,基本含义是"使变得安全",即"由不安全变得安全",指向的是由不安全变得安全的客观过程。20世纪90年代后期,我国学者在翻译介绍以巴瑞·布赞为代表的哥本哈根学派安全理论时,把这一安全理论中的securitization一词,也翻译为"安全化"。但是,哥本哈根学派的securitization一词,含义与汉语中原有的"安全化"一词不同,不是"使变得安全"的含义,不是指"由不安全变得安全"的客观过程,而是指把原来不在安全讨论范围的问题纳入安全讨论范围之中进行讨论,因而是一个主观过程。因此,根据其理论解释与含义,哥本哈根学派安全理论中的securitization一词,应准确汉译为"安全议程化",而不应翻译为给人以误导的"安全化"。把一个不在安全议程内的问题纳入安全议程进行讨论,并没有改变这个问题究竟是不是安全问题的客观现实,改变的只是这个问题是否被纳入安全议程的主观认知。由于security一词在英文中的多义性,它在表达与汉语"安全"相同的"没有危险、不受威胁"的含义的同时,还可以表达人们对安全的感受,甚至可以表达安全行动、安全机构,等等,因而汉语中表达"使变得安全"之含义的"安全化",也可以翻译为英文securitization。 展开更多
关键词 安全化 安全议程化 哥本哈根学派 国家安全学 概念研究 逻辑方法
在线阅读 免费下载
机载嵌入式软件的安全性机制研究 预览
6
作者 周光海 《电子测试》 2019年第6期18-19,共2页
在我国的航空领域发展过程中,机载嵌入式软件发挥着重要的作用,如果机载嵌入式软件出现问题将会给航空领域的发展带来不利影响。因此,本文主要是针对机载嵌入式软件的安全性机制进行研究。
关键词 机载嵌入式软件 安全性 安全评估 机制研究
在线阅读 下载PDF
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing 预览
7
作者 Xu Cheng Fulong Chen +3 位作者 Dong Xie Hui Sun Cheng Huang Zhuyun Qi 《国际计算机前沿大会会议论文集》 2019年第1期409-411,共3页
Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted thi... Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security transmission. In this paper, the blockchain technology is used to describe the security requirements in authentication process. A network model of MCPS based on blockchain is proposed. Through analysis of medical data storage architecture, data was ensured not to be tampered and trackable. The security threat was eliminated by bilinear mapping in the authentication process of medical data providers and users. The credibility problem of the trusted third party was avoided and the two-way authentication was realized between the hospital and blockchain node. The security analysis and performance test were carried out to verify the security and related performance of the authentication protocol. The results show that the MCPS based on blockchain realizes medical treatment data sharing, and meets safety requirements in the security authentication phase. 展开更多
关键词 CYBER Physical Systems Data SECURITY SHARING Blockchain DECENTRALIZATION feature SECURITY AUTHENTICATION
在线阅读 下载PDF
A Cloud Computing Security Model Based on Noninterference
8
作者 LU Congdong QIAN Gang CHEN Tao 《武汉大学学报:自然科学英文版》 CAS CSCD 2019年第3期194-200,共7页
In cloud computing, the risk of data leakage exists between users and virtual machines. Whether it is direct or indirect data leakage, it can be regarded as illegal information flow. Methods such as access control mod... In cloud computing, the risk of data leakage exists between users and virtual machines. Whether it is direct or indirect data leakage, it can be regarded as illegal information flow. Methods such as access control models can control the information flow rather than the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing. Typical noninterference models are not suitable to verificate information flow in cloud computing. When concurrent access actions execute in the cloud architecture, security domains do not affect each other, because there is no information flow between security domains. Based on this, we propose noninterference for cloud architecture in which concurrent access and sequential access coexist. When the sequential actions execute, the information flow between security domains can flow in accordance with established rules. When concurrent access actions execute, there should not be the information flow between security domains. 展开更多
关键词 CLOUD COMPUTING SECURITY information flow SECURITY NONINTERFERENCE NONINTERFERENCE MODELS
Cloud Storage Security Assessment Through Equilibrium Analysis
9
作者 Yuzhao Wu Yongqiang Lyu Yuanchun Shi 《清华大学学报自然科学版(英文版)》 EI CAS CSCD 2019年第6期738-749,共12页
With ever greater amounts of data stored in cloud servers, data security and privacy issues have become increasingly important. Public cloud storage providers are semi-trustworthy because they may not have adequate se... With ever greater amounts of data stored in cloud servers, data security and privacy issues have become increasingly important. Public cloud storage providers are semi-trustworthy because they may not have adequate security mechanisms to protect user data from being stolen or misused. Therefore, it is crucial for cloud users to evaluate the security of cloud storage providers. However, existing security assessment methods mainly focus on external security risks without considering the trustworthiness of cloud providers. In addition, the widely used thirdparty mediators are assumed to be trusted and we are not aware of any work that considers the security of these mediators. This study fills these gaps by assessing the security of public cloud storage providers and third-party mediators through equilibrium analysis. More specifically, we conduct evaluations on a series of game models between public cloud storage providers and users to thoroughly analyze the security of different service scenarios.Using our proposed security assessment, users can determine the risk of whether their privacy data is likely to be hacked by the cloud service providers;the cloud service providers can also decide on strategies to make their services more trustworthy. An experimental study of 32 users verified our method and indicated its potential for real service improvement. 展开更多
关键词 CLOUD STORAGE SECURITY SECURITY ASSESSMENT EQUILIBRIUM analysis
News Roundup
10
《中国与非洲:英文版》 2019年第11期6-9,共4页
CHINA Food Security China issued a white paper on food security on October 14, detailing the country’s efforts in enhancing food security and expanding international cooperation in the area.
关键词 EXPANDING SECURITY SECURITY
Research on the Construction of Safety Guarantee System for Police Technical and Tactical Training in Public Security Colleg 预览
11
作者 Yuehua Zhang Ping Wang 《教育理论与管理杂志(英文)》 2019年第1期17-21,共5页
The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulatio... The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period. 展开更多
关键词 PUBLIC SECURITY COLLEGES POLICE TECHNICAL and tactical TRAINING SECURITY system
在线阅读 免费下载
The Social Security Miracle of China: Development Mechanism and Institutional Transformation 预览
12
作者 Lin Mingang Linguist 《当代社会科学(英文)》 2019年第6期43-52,共10页
In the rapid progress of China’s economic development and social security,economic development has led to a higher level of social security.Every economic crisis or economic adjustment has created the opportunity for... In the rapid progress of China’s economic development and social security,economic development has led to a higher level of social security.Every economic crisis or economic adjustment has created the opportunity for improving social security.This paper argues that there is a“shock-response”relationship between economic development and social security and analyzes how social security changed from the passive response to the active response.Due to economic growth,the politics centering on people’s livelihood has promoted the full coverage of the social security system.The government investment in social security has been increasing,showing a new pattern of“middle-level economic growth and middle-level social welfare”and is helping to shift away from the previous“put welfare behind development”model toward simultaneous development and coordinated development.Creating a virtuous cycle of social security and economic development has become a key issue that China must face and need to solve on its way to become a strong country. 展开更多
关键词 SOCIAL SECURITY ECONOMIC development SOCIAL SECURITY MIRACLE shock-response
在线阅读 免费下载
Universally composable secure geographic area verification without pre-shared secret
13
作者 Junwei ZHANG Ning LU +1 位作者 Jianfeng MA Chao YANG 《中国科学:信息科学(英文版)》 SCIE EI CSCD 2019年第3期171-185,共15页
The geographic area information of smart devices is required for realizing efficient area-based operations in 5G networks,Internet of Things,and so on.Because majority of smart devices are unmanned and are deployed in... The geographic area information of smart devices is required for realizing efficient area-based operations in 5G networks,Internet of Things,and so on.Because majority of smart devices are unmanned and are deployed in a hostile environment,secure geographic area verification is one of the important security issues for ensuring the accuracy of geographic area information of smart devices.In this study,we investigate the composition security of geographic area verification in a universally composable(UC)framework.First,we design the ideal functionality of geographic area verification;further,we propose a novel pre-shared secret-free secure geographic area verification protocol CAVδ.We also propose an improved protocol CAVδ^T exhibiting a smaller false accept ratio than that exhibited by CAVδ.The proposed protocols can be used for verifying the geographic area information of smart devices without the requirement of any pre-shared secret during the initialization phase and additional key management when the protocols are running.Furthermore,the proposed protocols support the batch verification of multiple smart devices in one run,which is considered to be suitable for several location-critical smart devices.Subsequently,in the UC framework,we proved that our protocols achieve the necessary composition security and that our proto cols exhibit an ability to resist colluding attacks. 展开更多
关键词 GEOGRAPHIC area VERIFICATION pre-shared secret-free composition SECURITY colluding attacks provable SECURITY
Associated Risks in Mobile Applications Permissions 预览
14
作者 Mohammed Al Jutail Mousa Al-Akhras Abdulaziz Albesher 《信息安全(英文)》 2019年第2期69-90,共22页
Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permi... Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can access user’s private data such as reading call log. The second group contains the permissions that can modify user’s data such as modifying the numbers in contacts. The third group contains the remaining permissions which can track the location, and use the microphone and other sensitive issues that can spy on the user. This research is supported by a study that was conducted on 100 participants in Saudi Arabia to show the level of users’ awareness of associated risks in mobile applications permissions. Associations among the collected data are also analyzed. This research fills the gap in user’s awareness by providing best practices in addition to developing a new mobile application to help users decide whether an application is safe to be installed and used or not. This application is called “Sparrow” and is available in Google Play Store. 展开更多
关键词 Mobile PERMISSION Android PRIVACY ATTACK Security Association APRIORI
在线阅读 免费下载
The Main Characters of the International Security Situation in 2018
15
作者 Hou Hongyu 《和平》 2019年第1期53-56,共4页
Since the year 2018,major countries were increasingtheircompetition,traditional security was returning,geo-rivalry was becoming heated,the international architecture adjustment was deepened,and the international order... Since the year 2018,major countries were increasingtheircompetition,traditional security was returning,geo-rivalry was becoming heated,the international architecture adjustment was deepened,and the international order reshaping was accentuating,so security situation witnessed an overall stability,but the disability and uncertainty were growing,the security ridden risks were accumulating,featured by cooperation without tranquility. 展开更多
关键词 China The MAIN CHARACTERS of the INTERNATIONAL SECURITY SITUATION in 2018 SECURITY
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
16
作者 Ya QIN Guo-wei SHEN +3 位作者 Wen-bo ZHAO Yan-ping CHEN Miao YU Xin JIN 《信息与电子工程前沿:英文版》 SCIE EI CSCD 2019年第6期872-884,共13页
By network security threat intelligence analysis based on a security knowledge graph(SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is d... By network security threat intelligence analysis based on a security knowledge graph(SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is difficult for traditional named entity recognition methods to identify mixed security entities in Chinese and English in the field of network security, and there are difficulties in accurately identifying network security entities because of insufficient features extracted. In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural network CNN-BiLSTM-CRF model combined with a feature template(FT). The feature template is used to extract local context features, and a neural network model is used to automatically extract character features and text global features. Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security dataset and outperforms other methods. 展开更多
关键词 NETWORK SECURITY ENTITY SECURITY knowledge graph (SKG) ENTITY recognition FEATURE TEMPLATE Neural NETWORK
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform 预览
17
作者 Ashraful Tauhid Maisha Tasnim +2 位作者 Saima Arifin Noor Nuruzzaman Faruqui Mohammad Abu Yousuf 《信息安全(英文)》 2019年第3期117-129,共13页
Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristi... Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption. 展开更多
关键词 CRYPTOGRAPHY STEGANOGRAPHY SECURITY ENCRYPTION DECRYPTION
在线阅读 免费下载
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion
18
作者 Chong Wang Nasro Min-Allah +3 位作者 Bei Guan Yu-Qi Lin Jing-Zheng Wu Yong-Ji Wang 《计算机科学技术学报:英文版》 SCIE EI CSCD 2019年第6期1351-1365,共15页
Covert channels have been an effective means for leaking confidential information across security domains and numerous studies are available on typical covert channels attacks and defenses.Existing covert channel thre... Covert channels have been an effective means for leaking confidential information across security domains and numerous studies are available on typical covert channels attacks and defenses.Existing covert channel threat restriction solutions are based on the threat estimation criteria of covert channels such as capacity,accuracy,and short messages which are effective in evaluating the information transmission ability of a covert(storage)channel.However,these criteria cannot comprehensively reflect the key factors in the communication process such as shared resources and synchronization and therefore are unable to evaluate covertness and complexity of increasingly upgraded covert storage channels.As a solution,the anti-detection criterion was introduced to eliminate these limitations of cover channels.Though effective,most threat restriction techniques inevitably incur high performance overhead and hence become impractical.In this work,we avoid such overheads and present a restriction algorithm based on the anti-detection criterion to restrict threats that are associated with covert storage channels in virtual machines while maintaining the resource efficiency of the systems.Experimental evaluation shows that our proposed solution is able to counter covert storage channel attacks in an effective manner.Compared with Pump,a well-known traditional restriction algorithm used in practical systems,our solution significantly reduces the system overhead. 展开更多
关键词 covert storage channel information security covert channel threat evaluation security and privacy protection
HASN:A Hierarchical Attack Surface Network for System Security Analysis 预览
19
作者 Kangyu Huang Lin Yang +2 位作者 Renfang Fu Shengli Zhou Zheng Hong 《中国通信:英文版》 SCIE CSCD 2019年第5期137-157,共21页
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network har... Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network hardening solution. Numerous attack surface models have been proposed in the past decade,but they are not appropriate for describing complex systems with heterogeneous components. To address this limitation, we propose to use a two-layer Hierarchical Attack Surface Network(HASN) that models the data interactions and resource distribution of the system in a component-oriented view. First, we formally define the HASN by extending the entry point and exit point framework. Second, in order to assess data input risk and output risk on the HASN, we propose two behaviour models and two simulation-based risk metrics. Last, we conduct experiments for three network systems. Our experimental results show that the proposed approach is applicable and effective. 展开更多
关键词 ATTACK SURFACE SECURITY ANALYSIS SECURITY model RISK assessment
在线阅读 下载PDF
A Dynamic Access Control Method for SDN 预览
20
作者 Dexian Chang Wanzhong Sun +1 位作者 Yingjie Yang Tingting Wang 《电脑和通信(英文)》 2019年第10期105-115,共11页
Aiming at the problem that network topology changes frequently in SDN (Software Defined Network) environment and it is difficult to implement fine-grained access control, utilizing the characteristics of SDN transfer ... Aiming at the problem that network topology changes frequently in SDN (Software Defined Network) environment and it is difficult to implement fine-grained access control, utilizing the characteristics of SDN transfer control separation and software programming, the ABAC model (Attribute-Based Access Control) is extended by introducing security level, and the security level is defined for the attributes of subject and object to establish the access mapping relationship based on mandatory access rules. At the same time, with secure access path as SDN access control attribute, a dynamic generation method of access control path based on PSO (Particle Swarm Optimization) algorithm is designed to ensure the security of access data flow. The prototype system experiments show that the proposed method takes into account the fine-grained and dynamic requirements of SDN access control, and improves the access security of SDN while ensuring the access efficiency. 展开更多
关键词 ACCESS CONTROL SECURITY SDN ABAC DYNAMIC
在线阅读 免费下载
上一页 1 2 250 下一页 到第
使用帮助 返回顶部 意见反馈