期刊文献+
共找到2,968篇文章
< 1 2 149 >
每页显示 20 50 100
Security analysis and secured access design for networks of image remote sensing
1
作者 Juan Zhao Haibo Dai +3 位作者 Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li 《Digital Communications and Networks》 2025年第1期136-144,共9页
The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sens... The secured access is studied in this paper for the network of the image remote sensing.Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point.In order to enhance the sensing quality for the remote uploading,the passive reflection surface technique is employed.If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks,he may receive the same image from this sensor.Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images.In order to achieve this goal,the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients.Based on this theoretical result,the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor.Finally,the analytical expression is theoretically derived for the optimum uploading power.Numerical simulations verify the design approach. 展开更多
关键词 Image remote sensing secured access Energy efficiency Sensor transmit power secured access design
在线阅读 下载PDF
ResearchonsecureaccessmechanismininternetofthingsbasedonTePA 被引量:4
2
作者 杨年鹏 龙昭华 +1 位作者 蒋贵全 马艳 《计算机工程与设计》 CSCD 北大核心 2012年第4期1305-1309,共5页
以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制。该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须... 以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制。该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须通过其它两方的身份验证。从性能和安全等方面分析了该机制的可行性和可靠性,增强了物联网下对接入访问的安全控制,从而对物联网的建设发展起到了一定的建言作用。 展开更多
关键词 物联网 无线传感器网络 安全接入 三元对等鉴别 椭圆曲线密码
在线阅读 下载PDF
Service Security Architecture and Access Control Model for Cloud Computing 被引量:3
3
作者 闫丹凤 杨放春 Tet Yeap 《China Communications》 SCIE CSCD 2011年第6期44-50,共7页
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m... Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. 展开更多
关键词 cloud computing service security security architecture access control AUTHORIZATION
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
4
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
5
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote access Communications security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
在线阅读 下载PDF
Security of Broadband Access Network
6
作者 Wang Deqiang 《ZTE Communications》 2007年第1期37-41,共5页
Due to the rapid development of broadband access technologies,the broadband access networks have wider and wider application.However,with the development,the security issue became a public concern.Under the environmen... Due to the rapid development of broadband access technologies,the broadband access networks have wider and wider application.However,with the development,the security issue became a public concern.Under the environment of access network,customers,access equipment and networks all face various threats,especially those from the user side.Such technologies and solutions as port positioning,fraud prevention on Medium Access Control(MAC)addresses and monitoring of illegal services might be the solution to the security problem existing in the current networks. 展开更多
关键词 access MAC security of Broadband access Network PPPOE
在线阅读 下载PDF
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue 被引量:2
7
作者 Wahid Rajeh 《Journal of Information Security》 2022年第2期23-42,共20页
Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Be... Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Because of that, the technology remained vulnerable to malicious activities of unauthorized users whose purpose is to endanger system functionalities or to compromise private user data. Researchers and developers are continuously trying to solve these issues by upgrading Hadoop’s security mechanisms and preventing undesirable malicious activities. In this paper, the most common HDFS security problems and a review of unauthorized access issues are presented. First, Hadoop mechanism and its main components are described as the introduction part of the leading research problem. Then, HDFS architecture is given, and all including components and functionalities are introduced. Further, all possible types of users are listed with an accent on unauthorized users, which are of great importance for the paper. One part of the research is dedicated to the consideration of Hadoop security levels, environment and user assessments. The review also includes an explanation of Log Monitoring and Audit features, and detail consideration of authorization and authentication issues. Possible consequences of unauthorized access to a system are covered, and a few recommendations for solving problems of unauthorized access are offered. Honeypot nodes, security mechanisms for collecting valuable information about malicious parties, are presented in the last part of the paper. Finally, the idea for developing a new type of Intrusion Detector, which will be based on using an artificial neural network, is presented. The detector will be an integral part of a new kind of virtual honeypot mechanism and represents the initial base for future scientific work of authors. 展开更多
关键词 Hadoop security Issue Unauthorized access Honeypot Node Intrusion Detector
在线阅读 下载PDF
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
8
作者 Yan Wang Hongli Liu Jun Feng 《Circuits and Systems》 2010年第1期30-33,共4页
This paper deals with the design of an intelligent access control system based on the fingerprint sensor FPC- 1011C. The design uses the S3C2410 and TMS320VC5510A as the system processor. A fingerprint acquisition mod... This paper deals with the design of an intelligent access control system based on the fingerprint sensor FPC- 1011C. The design uses the S3C2410 and TMS320VC5510A as the system processor. A fingerprint acquisition module and a wireless alarm module were designed by using the fingerprint sensor FPC1011C and GPRS module SIM100 respectively. The whole system was implemented wireless alarm through messages and GPRS-Internet in the GSM/GPRS web. In order to achieve the simple and high Real-time system, the μC-Linux system migration was also implemented. 展开更多
关键词 FINGERPRINT Sensor securITY access Control System ARM WIRELESS ALARM
在线阅读 下载PDF
A Method of Auxiliary Planning for Intelligent Substation Access System Based on Security Region
9
作者 Gao Yi Songtao Zhang +4 位作者 Chao Qin Yuan Zeng Yang Yang Yingying Liu Shengwei Li 《Energy and Power Engineering》 2017年第4期675-682,共8页
This paper presents an auxiliary planning method for intelligent substation access system based on security region. Firstly, the method of resolving the static voltage security region is proposed. Secondly, the method... This paper presents an auxiliary planning method for intelligent substation access system based on security region. Firstly, the method of resolving the static voltage security region is proposed. Secondly, the method of constructing the optimal index of substation accession is given, which is used to describe the priority of the node into the substation. Finally, a complete set of intelligent substation access system auxiliary planning strategy is given, which takes into account the constraints of the normal operation of the grid on the voltage amplitude. 展开更多
关键词 SUBSTATION the STATIC securITY REGION Optimized Index of SUBSTATION accessION
暂未订购
Food Access and Experience of Food Insecurity in Nigerian Households during the COVID-19 Lockdown
10
作者 Folake O. Samuel Toluwalope E. Eyinla +3 位作者 Ariyo Oluwaseun Oluwatosin O. Leshi Bartholomew I. C. Brai Wasiu A. O. Afolabi 《Food and Nutrition Sciences》 2021年第11期1062-1072,共11页
The food insecurity experiences and related behaviors of Nigerian households during the COVID-19 lockdown have not been fully discussed. This study was conducted to elicit information on the impact of COVID-19 lockdow... The food insecurity experiences and related behaviors of Nigerian households during the COVID-19 lockdown have not been fully discussed. This study was conducted to elicit information on the impact of COVID-19 lockdown on economic and behavioral patterns related to food access. An online-based semi-structured questionnaire distributed through messaging platforms was used to collect information on characteristics, food purchasing behaviour be<span>fore and during COVID-19 lockdown among respondents. Experience of</span> food insecurity was assessed using Food Insecurity Experience Scale (FIES). A total of 883 responses were received and analyzed using SPSS Version 20.0. Most of the respondents (90.5%) were at home or had stopped going to work due to COVID-19 restrictions. Even though smaller households had higher food <span>expenditure claims than larger households (p = 0.012), the larger the</span> house<span>hold, the more acute the challenge of economic access to food (p = 0.050)</span>. Location (p = 0.000), age (p = 0.003), occupation (p = 0.014) and income level (p = 0.000) were associated with experience of food insecurity. In conclusion, lockdown restrictions increased food expenditure and experience of food insecurity among the respondents and thus we recommend the probe of long-term consequences of deviations from usual food access on undernutrition or overnutrition in Nigerian households. 展开更多
关键词 Food security COVID-19 FIES Lockdown Food access
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
11
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD DATA STORAGE CLOUD Service PROVIDER Formula-Based CLOUD DATA access Control Multi-Agent System and secure Java Agent Development Framework
在线阅读 下载PDF
面向移动边缘计算的协作NOMA安全卸载能耗优化
12
作者 陈健 马天瑞 +2 位作者 杨龙 吕璐 徐勇军 《电子与信息学报》 北大核心 2026年第2期534-544,共11页
为降低移动边缘计算(MEC)网络安全卸载过程的能耗,该文设计一种基于协作非正交多址(NOMA)的安全卸载模式,利用协作节点的通信和计算能力置换系统的安全性能。考虑设备计算和通信等资源分配的联合设计,该文提出保密中断概率(SOP)约束下... 为降低移动边缘计算(MEC)网络安全卸载过程的能耗,该文设计一种基于协作非正交多址(NOMA)的安全卸载模式,利用协作节点的通信和计算能力置换系统的安全性能。考虑设备计算和通信等资源分配的联合设计,该文提出保密中断概率(SOP)约束下的系统加权总能耗最小化问题。针对该非凸优化问题,将其分解为时隙与任务分配和功率分配两个子问题,并提出一种基于交替和逐次凸逼近(SCA)的迭代算法求解,依据信道状态和计算资源调整用户节点与协作节点之间的负载、功率和时隙分配。理论分析与仿真结果表明,所提算法收敛且具有低复杂度,相比于现有的NOMA转发卸载方案、友好干扰方案和NOMA迁移计算方案,可显著降低系统能耗,同时具备更高负载能力和更强的抗窃听能力,实现了节点在通信、计算和安全之间的权衡折衷。 展开更多
关键词 移动边缘计算 非正交多址接入 物理层安全 用户协作 计算卸载
在线阅读 下载PDF
Study on Mandatory Access Control in a Secure Database Management System
13
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance integrity cluster
在线阅读 下载PDF
Access-list技术应用研究 被引量:2
14
作者 陈琳 朱绍文 +2 位作者 胡君红 袁嵩 高小新 《航空计算技术》 2002年第2期66-70,共5页
访问表是网络防御外来安全威胁的第一关 ,它是通过允许或拒绝信息流通过路由器的接口来实现的一种机制。本文介绍了访问表的基本概念、基本原理以及具有高级安全特性的新一代访问表 ,给出了一个建立应用访问表的实例 ,最后对各种网络安... 访问表是网络防御外来安全威胁的第一关 ,它是通过允许或拒绝信息流通过路由器的接口来实现的一种机制。本文介绍了访问表的基本概念、基本原理以及具有高级安全特性的新一代访问表 ,给出了一个建立应用访问表的实例 ,最后对各种网络安全威胁给出了对策及实现方案。 展开更多
关键词 网络安全 Cisoo路由器 安全对策 访问表 access-list技术
在线阅读 下载PDF
防止非法下载ACCESS数据库 被引量:1
15
作者 李双远 赵剑 张立君 《吉林化工学院学报》 CAS 2005年第3期59-60,共2页
数据库类型如果采用ACCESS数据库,在带来便捷的同时,也存在着数据库易被下载的安全隐患.为了确保ACCESS数据库的安全性,介绍如何防止非法下载ACCESS数据库的方法.
关键词 access 数据库 安全
在线阅读 下载PDF
浅谈Access数据库安全策略 被引量:10
16
作者 罗英均 徐兵 冉戎 《电脑知识与技术》 2005年第2期25-27,共3页
随着Internet的发展,Web技术日新月异,数据库技术也得到了飞速的发展,在众多的数据库技术中,Ac鄄cess数据库作为微软推出的以标准JET为引擎的桌面型数据库系统,由于具有操作简单、界面友好等特点,具有较大的用户群体。Access数据库在为... 随着Internet的发展,Web技术日新月异,数据库技术也得到了飞速的发展,在众多的数据库技术中,Ac鄄cess数据库作为微软推出的以标准JET为引擎的桌面型数据库系统,由于具有操作简单、界面友好等特点,具有较大的用户群体。Access数据库在为我们带来便捷的同时,也带来了不容忽视的安全问题。本文主要针对Access数据库存在的安全问题提出了相应的解决方法。 展开更多
关键词 access 数据库 数据管理 数据库管理系统 安全策略
在线阅读 下载PDF
基于动态数据敏感等级的大数据细粒度访问控制模型
17
作者 张焕 侯明星 +1 位作者 刘光娜 史颖 《计算机科学》 北大核心 2026年第2期187-195,共9页
针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据... 针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据的实时敏感等级,克服了传统静态分类的僵化性。在此基础上,将动态敏感等级作为核心决策属性,与基于属性的访问控制模型深度集成,设计了一种情境自适应的权限动态授予与撤销机制,实现了对不同用户在不同时间、地点及场景下访问行为的精准管控。实验结果表明,该模型能够在保证较低性能开销的同时,有效感知数据价值与风险的变化,相较于传统基于角色的访问控制模型和静态基于属性的访问控制模型,在权限分配的精确度与安全性上均有显著提升,尤其适用于数据流动频繁、安全需求多变的大数据应用场景,为构建智能、自适应的数据安全防护体系提供了有效途径。 展开更多
关键词 大数据安全 访问控制 细粒度 动态敏感等级 属性基访问控制
在线阅读 下载PDF
关于网站使用ACCESS数据库安全性的分析 被引量:4
18
作者 安晓瑞 《甘肃高师学报》 2012年第2期45-48,共4页
数据库是网站运行的基础.Access数据库具有界面友好、易学易用、开发简单、接口灵活等特点,是一个典型的数据管理和信息系统开发工具.大部分中企事业单位的网站都选择Access数据库.然而Access数据库存在安全隐患和极易被攻击等问题,为... 数据库是网站运行的基础.Access数据库具有界面友好、易学易用、开发简单、接口灵活等特点,是一个典型的数据管理和信息系统开发工具.大部分中企事业单位的网站都选择Access数据库.然而Access数据库存在安全隐患和极易被攻击等问题,为服务器及网站带来安全隐患.本文从影响Access数据库安全性的几个方面入手,做一些深入的探讨,希望能增强网站管理员的安全防范意识和管理水平. 展开更多
关键词 access数据库 安全性 网站
在线阅读 下载PDF
关于ASP+ ACCESS数据库的安全问题 被引量:3
19
作者 林姿琼 《漳州师范学院学报(自然科学版)》 2005年第3期33-37,共5页
本文对用ASP和Access构造网站中存在的普遍性安全问题进行分析,并探讨了相应的解决方法.
关键词 ASP access SQL 数据库安全
在线阅读 下载PDF
Access XP数据库的安全性研究 被引量:2
20
作者 李海燕 《中国安全科学学报》 CAS CSCD 2005年第5期67-70,共4页
在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详... 在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详细地阐述了MicrosoftAccessXP数据库的安全机制;探讨了实现MicrosoftAccessXP数据库不同保护级别的各种方法;还讨论了共享级安全性和用户级安全性问题。 展开更多
关键词 access 安全性研究 XP MICROSOFT Internet 信息资源 信息化时代 数据库系统 安全保密性 安全性问题 社会价值 安全机制 保护级别 用户级 共享
在线阅读 下载PDF
上一页 1 2 149 下一页 到第
使用帮助 返回顶部