期刊文献+
共找到2,928篇文章
< 1 2 147 >
每页显示 20 50 100
Security analysis and secured access design for networks of image remote sensing
1
作者 Juan Zhao Haibo Dai +3 位作者 Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li 《Digital Communications and Networks》 2025年第1期136-144,共9页
The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sens... The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach. 展开更多
关键词 Image remote sensing secured access Energy efficiency Sensor transmit power secured access design
在线阅读 下载PDF
ResearchonsecureaccessmechanismininternetofthingsbasedonTePA 被引量:4
2
作者 杨年鹏 龙昭华 +1 位作者 蒋贵全 马艳 《计算机工程与设计》 CSCD 北大核心 2012年第4期1305-1309,共5页
以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制。该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须... 以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制。该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须通过其它两方的身份验证。从性能和安全等方面分析了该机制的可行性和可靠性,增强了物联网下对接入访问的安全控制,从而对物联网的建设发展起到了一定的建言作用。 展开更多
关键词 物联网 无线传感器网络 安全接入 三元对等鉴别 椭圆曲线密码
在线阅读 下载PDF
Service Security Architecture and Access Control Model for Cloud Computing 被引量:3
3
作者 闫丹凤 杨放春 Tet Yeap 《China Communications》 SCIE CSCD 2011年第6期44-50,共7页
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m... Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. 展开更多
关键词 cloud computing service security security architecture access control AUTHORIZATION
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
4
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
5
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote access Communications security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
Security of Broadband Access Network
6
作者 Wang Deqiang(Network Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2007年第1期37-41,共5页
Due to the rapid development of broadband access technologies, the broadband access networks have wider and wider application. However, with the development, the security issue became a public concern. Under the envir... Due to the rapid development of broadband access technologies, the broadband access networks have wider and wider application. However, with the development, the security issue became a public concern. Under the environment of access network, customers, access equipment and networks all face various threats, especially those from the user side. Such technologies and solutions as port positioning, fraud prevention on Medium Access Control (MAC) addresses and monitoring of illegal services might be the solution to the security problem existing in the current networks. 展开更多
关键词 access MAC security of Broadband access Network PPPOE
在线阅读 下载PDF
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue 被引量:2
7
作者 Wahid Rajeh 《Journal of Information Security》 2022年第2期23-42,共20页
Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Be... Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Because of that, the technology remained vulnerable to malicious activities of unauthorized users whose purpose is to endanger system functionalities or to compromise private user data. Researchers and developers are continuously trying to solve these issues by upgrading Hadoop’s security mechanisms and preventing undesirable malicious activities. In this paper, the most common HDFS security problems and a review of unauthorized access issues are presented. First, Hadoop mechanism and its main components are described as the introduction part of the leading research problem. Then, HDFS architecture is given, and all including components and functionalities are introduced. Further, all possible types of users are listed with an accent on unauthorized users, which are of great importance for the paper. One part of the research is dedicated to the consideration of Hadoop security levels, environment and user assessments. The review also includes an explanation of Log Monitoring and Audit features, and detail consideration of authorization and authentication issues. Possible consequences of unauthorized access to a system are covered, and a few recommendations for solving problems of unauthorized access are offered. Honeypot nodes, security mechanisms for collecting valuable information about malicious parties, are presented in the last part of the paper. Finally, the idea for developing a new type of Intrusion Detector, which will be based on using an artificial neural network, is presented. The detector will be an integral part of a new kind of virtual honeypot mechanism and represents the initial base for future scientific work of authors. 展开更多
关键词 Hadoop security Issue Unauthorized access Honeypot Node Intrusion Detector
在线阅读 下载PDF
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
8
作者 Yan Wang Hongli Liu Jun Feng 《Circuits and Systems》 2010年第1期30-33,共4页
This paper deals with the design of an intelligent access control system based on the fingerprint sensor FPC- 1011C. The design uses the S3C2410 and TMS320VC5510A as the system processor. A fingerprint acquisition mod... This paper deals with the design of an intelligent access control system based on the fingerprint sensor FPC- 1011C. The design uses the S3C2410 and TMS320VC5510A as the system processor. A fingerprint acquisition module and a wireless alarm module were designed by using the fingerprint sensor FPC1011C and GPRS module SIM100 respectively. The whole system was implemented wireless alarm through messages and GPRS-Internet in the GSM/GPRS web. In order to achieve the simple and high Real-time system, the μC-Linux system migration was also implemented. 展开更多
关键词 FINGERPRINT Sensor securITY access Control System ARM WIRELESS ALARM
在线阅读 下载PDF
A Method of Auxiliary Planning for Intelligent Substation Access System Based on Security Region
9
作者 Gao Yi Songtao Zhang +4 位作者 Chao Qin Yuan Zeng Yang Yang Yingying Liu Shengwei Li 《Energy and Power Engineering》 2017年第4期675-682,共8页
This paper presents an auxiliary planning method for intelligent substation access system based on security region. Firstly, the method of resolving the static voltage security region is proposed. Secondly, the method... This paper presents an auxiliary planning method for intelligent substation access system based on security region. Firstly, the method of resolving the static voltage security region is proposed. Secondly, the method of constructing the optimal index of substation accession is given, which is used to describe the priority of the node into the substation. Finally, a complete set of intelligent substation access system auxiliary planning strategy is given, which takes into account the constraints of the normal operation of the grid on the voltage amplitude. 展开更多
关键词 SUBSTATION the STATIC securITY REGION Optimized Index of SUBSTATION accessION
暂未订购
Food Access and Experience of Food Insecurity in Nigerian Households during the COVID-19 Lockdown
10
作者 Folake O. Samuel Toluwalope E. Eyinla +3 位作者 Ariyo Oluwaseun Oluwatosin O. Leshi Bartholomew I. C. Brai Wasiu A. O. Afolabi 《Food and Nutrition Sciences》 2021年第11期1062-1072,共11页
The food insecurity experiences and related behaviors of Nigerian households during the COVID-19 lockdown have not been fully discussed. This study was conducted to elicit information on the impact of COVID-19 lockdow... The food insecurity experiences and related behaviors of Nigerian households during the COVID-19 lockdown have not been fully discussed. This study was conducted to elicit information on the impact of COVID-19 lockdown on economic and behavioral patterns related to food access. An online-based semi-structured questionnaire distributed through messaging platforms was used to collect information on characteristics, food purchasing behaviour be<span>fore and during COVID-19 lockdown among respondents. Experience of</span> food insecurity was assessed using Food Insecurity Experience Scale (FIES). A total of 883 responses were received and analyzed using SPSS Version 20.0. Most of the respondents (90.5%) were at home or had stopped going to work due to COVID-19 restrictions. Even though smaller households had higher food <span>expenditure claims than larger households (p = 0.012), the larger the</span> house<span>hold, the more acute the challenge of economic access to food (p = 0.050)</span>. Location (p = 0.000), age (p = 0.003), occupation (p = 0.014) and income level (p = 0.000) were associated with experience of food insecurity. In conclusion, lockdown restrictions increased food expenditure and experience of food insecurity among the respondents and thus we recommend the probe of long-term consequences of deviations from usual food access on undernutrition or overnutrition in Nigerian households. 展开更多
关键词 Food security COVID-19 FIES Lockdown Food access
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
11
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD DATA STORAGE CLOUD Service PROVIDER Formula-Based CLOUD DATA access Control Multi-Agent System and secure Java Agent Development Framework
在线阅读 下载PDF
Study on Mandatory Access Control in a Secure Database Management System
12
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance integrity cluster
在线阅读 下载PDF
Access-list技术应用研究 被引量:2
13
作者 陈琳 朱绍文 +2 位作者 胡君红 袁嵩 高小新 《航空计算技术》 2002年第2期66-70,共5页
访问表是网络防御外来安全威胁的第一关 ,它是通过允许或拒绝信息流通过路由器的接口来实现的一种机制。本文介绍了访问表的基本概念、基本原理以及具有高级安全特性的新一代访问表 ,给出了一个建立应用访问表的实例 ,最后对各种网络安... 访问表是网络防御外来安全威胁的第一关 ,它是通过允许或拒绝信息流通过路由器的接口来实现的一种机制。本文介绍了访问表的基本概念、基本原理以及具有高级安全特性的新一代访问表 ,给出了一个建立应用访问表的实例 ,最后对各种网络安全威胁给出了对策及实现方案。 展开更多
关键词 网络安全 Cisoo路由器 安全对策 访问表 access-list技术
在线阅读 下载PDF
防止非法下载ACCESS数据库 被引量:1
14
作者 李双远 赵剑 张立君 《吉林化工学院学报》 CAS 2005年第3期59-60,共2页
数据库类型如果采用ACCESS数据库,在带来便捷的同时,也存在着数据库易被下载的安全隐患.为了确保ACCESS数据库的安全性,介绍如何防止非法下载ACCESS数据库的方法.
关键词 access 数据库 安全
在线阅读 下载PDF
浅谈Access数据库安全策略 被引量:10
15
作者 罗英均 徐兵 冉戎 《电脑知识与技术》 2005年第2期25-27,共3页
随着Internet的发展,Web技术日新月异,数据库技术也得到了飞速的发展,在众多的数据库技术中,Ac鄄cess数据库作为微软推出的以标准JET为引擎的桌面型数据库系统,由于具有操作简单、界面友好等特点,具有较大的用户群体。Access数据库在为... 随着Internet的发展,Web技术日新月异,数据库技术也得到了飞速的发展,在众多的数据库技术中,Ac鄄cess数据库作为微软推出的以标准JET为引擎的桌面型数据库系统,由于具有操作简单、界面友好等特点,具有较大的用户群体。Access数据库在为我们带来便捷的同时,也带来了不容忽视的安全问题。本文主要针对Access数据库存在的安全问题提出了相应的解决方法。 展开更多
关键词 access 数据库 数据管理 数据库管理系统 安全策略
在线阅读 下载PDF
关于网站使用ACCESS数据库安全性的分析 被引量:4
16
作者 安晓瑞 《甘肃高师学报》 2012年第2期45-48,共4页
数据库是网站运行的基础.Access数据库具有界面友好、易学易用、开发简单、接口灵活等特点,是一个典型的数据管理和信息系统开发工具.大部分中企事业单位的网站都选择Access数据库.然而Access数据库存在安全隐患和极易被攻击等问题,为... 数据库是网站运行的基础.Access数据库具有界面友好、易学易用、开发简单、接口灵活等特点,是一个典型的数据管理和信息系统开发工具.大部分中企事业单位的网站都选择Access数据库.然而Access数据库存在安全隐患和极易被攻击等问题,为服务器及网站带来安全隐患.本文从影响Access数据库安全性的几个方面入手,做一些深入的探讨,希望能增强网站管理员的安全防范意识和管理水平. 展开更多
关键词 access数据库 安全性 网站
在线阅读 下载PDF
关于ASP+ ACCESS数据库的安全问题 被引量:3
17
作者 林姿琼 《漳州师范学院学报(自然科学版)》 2005年第3期33-37,共5页
本文对用ASP和Access构造网站中存在的普遍性安全问题进行分析,并探讨了相应的解决方法.
关键词 ASP access SQL 数据库安全
在线阅读 下载PDF
Access XP数据库的安全性研究 被引量:2
18
作者 李海燕 《中国安全科学学报》 CAS CSCD 2005年第5期67-70,共4页
在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详... 在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详细地阐述了MicrosoftAccessXP数据库的安全机制;探讨了实现MicrosoftAccessXP数据库不同保护级别的各种方法;还讨论了共享级安全性和用户级安全性问题。 展开更多
关键词 access 安全性研究 XP MICROSOFT Internet 信息资源 信息化时代 数据库系统 安全保密性 安全性问题 社会价值 安全机制 保护级别 用户级 共享
在线阅读 下载PDF
Asp+access网站的安全问题及其防范 被引量:4
19
作者 王芸 陈晓前 《软件导刊》 2010年第8期165-166,共2页
Asp作为一种广泛使用的动态网页制作技术,结合微软office中的access数据库,目前被大量运用于中小型网站的制作中。asp+access网站相对脆弱的安全性使其成为黑客攻击的目标。从asp的常见安全问题出发,以Web服务器端、asp程序设计、数据... Asp作为一种广泛使用的动态网页制作技术,结合微软office中的access数据库,目前被大量运用于中小型网站的制作中。asp+access网站相对脆弱的安全性使其成为黑客攻击的目标。从asp的常见安全问题出发,以Web服务器端、asp程序设计、数据库安全三个方面对asp的安全技术进行分析,并指出ASP环境下的安全问题应从系统的全局进行分析和考虑,asp的安全应以预防为主。 展开更多
关键词 ASP技术 access 网站安全
在线阅读 下载PDF
基于ASP+Access开发的网站的安全隐患及对策 被引量:3
20
作者 王松 《楚雄师范学院学报》 2003年第3期11-13,共3页
通过分析采用ASP技术中几个常见的安全问题和Access数据库的安全性 ,提出了增强ASP +Access网站安全性的若干对策。
关键词 ASP access WEB服务器 安全
在线阅读 下载PDF
上一页 1 2 147 下一页 到第
使用帮助 返回顶部