期刊文献+
共找到1,142篇文章
< 1 2 58 >
每页显示 20 50 100
Web Security and Log Management: An Application Centric Perspective
1
作者 Andrew Mwaura Kahonge William Okello-Odongo +1 位作者 Evans K. Miriti Elisha Abade 《Journal of Information Security》 2013年第3期138-143,共6页
The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks... The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks continue to plague the Internet. We discuss risks that affect web applications and explain how network-centric and host-centric techniques, as much as they are crucial in an enterprise, lack necessary depth to comprehensively analyze overall application security. The nature of web applications to span a number of servers introduces a new dimension of security requirement that calls for a holistic approach to protect the information asset regardless of its physical or logical separation of modules and tiers. We therefore classify security mechanisms as either infrastructure-centric or application-centric based on what asset is being secured. We then describe requirements for such application-centric security mechanisms. 展开更多
关键词 Web security Internet APPLICATION Centric INFRASTRUCTURE Centric Network Centric HOST Centric log Management and Monitoring
暂未订购
A Cross Language Code Security Audit Framework Based on Normalized Representation
2
作者 Yong Chen Chao Xu +1 位作者 Jing Selena He Sheng Xiao 《Journal of Quantum Computing》 2022年第2期75-84,共10页
With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an impor... With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an important aspect of future audit that cannot be ignored.However,the existing code security audit ismainly based on source code,which is difficult to meet the audit needs of more and more programming languages and binary commercial software.Based on the idea of normalized transformation,this paper constructs a cross language code security audit framework(CLCSA).CLCSA first uses compile/decompile technology to convert different highlevel programming languages and binary codes into normalized representation,and then usesmachine learning technology to build a cross language code security audit model based on normalized representation to evaluate code security and find out possible code security vulnerabilities.Finally,for the discovered vulnerabilities,the heuristic search strategy will be used to find the best repair scheme from the existing normalized representation sample library for automatic repair,which can improve the effectiveness of code security audit.CLCSA realizes the normalized code security audit of different types and levels of code,which provides a strong support for improving the breadth and depth of code security audit. 展开更多
关键词 Code security audit NORMALIZATION cross language security vulnerabilities
在线阅读 下载PDF
Social Security audit integration path analysis
3
作者 Guo Yantong 《International English Education Research》 2015年第6期51-53,共3页
Nowadays, China has entered the aging countries sequence, reform and development of the social insurance system is facing more opportunities and challenges, which give the social insurance audit work of the new requir... Nowadays, China has entered the aging countries sequence, reform and development of the social insurance system is facing more opportunities and challenges, which give the social insurance audit work of the new requirements. In practice, the social insurance audit work has encountered new conflicts and problems. Due to the socio-economic composition, organizational forms, forms of employment, interest, distribution relations have had a dramatic and profound change, labor relations was diversified, contract, complex features, social insurance premium is difficult, concealed drain Daily contribution base, have occurred impersonator false and social insurance benefits behavior. Loss of the social insurance fund is now urgently containment dike, to further regulate the social insurance audit work has become an important issue in the New Social Insurance Development. Therefore, we must establish a sound social security audit system, and promote the integration of social security audits, and thus be able to maintain the smooth progress of China's social insurance work. 展开更多
关键词 Social security audit INTEGRATION path analysis
在线阅读 下载PDF
云计算环境下基于Syslog网络安全监测系统研究 被引量:1
4
作者 苏志强 《成都工业学院学报》 2025年第5期44-49,共6页
针对云计算环境中网络数据量较大,网络安全监测系统难以精准识别网络安全状态,系统漏报率与误报率较高等问题,在云计算环境下设计了一种基于Syslog网络安全监测系统。在监测系统中加设了Syslog服务器,根据数据采集内容与数量优化网络数... 针对云计算环境中网络数据量较大,网络安全监测系统难以精准识别网络安全状态,系统漏报率与误报率较高等问题,在云计算环境下设计了一种基于Syslog网络安全监测系统。在监测系统中加设了Syslog服务器,根据数据采集内容与数量优化网络数据采集器和云计算处理器。在软件算法层面上,利用云计算技术采集并提取网络日志数据特征,计算网络日志数据特征的Syslog协议匹配度,采用特征匹配的方式获取网络安全状态监测结果。通过系统测试实验得出结论:与传统系统相比,优化设计监测系统的漏报率与误报率均被控制在10%以下。 展开更多
关键词 云计算环境 Syslog协议 网络安全 网络日志 安全监测系统
在线阅读 下载PDF
Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network
5
作者 徐光伟 史有群 +2 位作者 朱明 吴国文 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期50-52,共3页
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy a... Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated. 展开更多
关键词 Ad Hoc security auditing access control of devices sign of devices property of event.
在线阅读 下载PDF
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
6
作者 Zheng Qingan Meng Jialin +2 位作者 Wu Junjie Li Jingtao Lin Haonan 《China Communications》 2025年第4期143-160,共18页
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system. 展开更多
关键词 access control authentication Hyperledger Fabric security audit state secret algorithm
在线阅读 下载PDF
ORACLEREDO LOG文件分析及C语言描述 被引量:3
7
作者 李伟明 《小型微型计算机系统》 CSCD 北大核心 2003年第7期1243-1246,共4页
Oracle数据库系统通过 REDO L OG技术来管理数据操作和事务 ,如何分析跟踪 REDO L OG文件 ,实现对数据库操作的监控 ,在数据库审计、数据库复制和数据库安全等方面具有重要的实用价值 .本文对 ORACL E REDO L OG文件进行了详尽的分析 ,... Oracle数据库系统通过 REDO L OG技术来管理数据操作和事务 ,如何分析跟踪 REDO L OG文件 ,实现对数据库操作的监控 ,在数据库审计、数据库复制和数据库安全等方面具有重要的实用价值 .本文对 ORACL E REDO L OG文件进行了详尽的分析 ,给出了 REDO L OG文件头、文件体块结构和文件数据结构的 C语言描述 ,以及 REDO L OG事务控制机制的分析 。 展开更多
关键词 REDO log 数据库 审计 复制
在线阅读 下载PDF
基于Syslog的网络日志管理分析模型 被引量:7
8
作者 黄文 谢冬青 《湖南科技学院学报》 2006年第5期164-167,共4页
日志文件分析是系统安全检测的重要内容;同时日志文件也是计算机取证的重要依据。本文针对分布式网络日志文件管理和分析中安全性低、相关性分析弱的问题,提出了基于Syslog协议的日志文安全管理和分析模型(SISyslog),并提出了该模型的... 日志文件分析是系统安全检测的重要内容;同时日志文件也是计算机取证的重要依据。本文针对分布式网络日志文件管理和分析中安全性低、相关性分析弱的问题,提出了基于Syslog协议的日志文安全管理和分析模型(SISyslog),并提出了该模型的实现方法。 展开更多
关键词 日志文件 安全检测 计算机取证 知识库 SYSlog
在线阅读 下载PDF
Syslog在企业网络管理中的应用 被引量:2
9
作者 温炜 郭玲 《宁夏电力》 2009年第5期42-45,共4页
Syslog常被称为系统日志或系统记录,可以用来管理计算机系统和进行安全审计,在不同的操作系统(Unix/Linux)的服务器、路由器、交换机等网络设备中,通过Syslog的系统记录,网络管理员可以随时掌握系统的安全状况,同时也为网络安全审计提... Syslog常被称为系统日志或系统记录,可以用来管理计算机系统和进行安全审计,在不同的操作系统(Unix/Linux)的服务器、路由器、交换机等网络设备中,通过Syslog的系统记录,网络管理员可以随时掌握系统的安全状况,同时也为网络安全审计提供事件记录依据。 展开更多
关键词 SYSlog 网络安全 日志配置 网络管理 审计分析
在线阅读 下载PDF
Syslog协议的安全漏洞 被引量:1
10
作者 黄文 《湖南科技学院学报》 2005年第5期127-128,共2页
Syslog协议有着非常优秀的网络日志管理机制,提供了网络日志的存储方法和传输通道。但是该协议在网络信息安全方面存在着缺乏数据加密、传输加密与认证等多个漏洞,若不加改进地直接应用可能会导致非常严重的安全问题。本文将对这些漏洞... Syslog协议有着非常优秀的网络日志管理机制,提供了网络日志的存储方法和传输通道。但是该协议在网络信息安全方面存在着缺乏数据加密、传输加密与认证等多个漏洞,若不加改进地直接应用可能会导致非常严重的安全问题。本文将对这些漏洞进行详细的分析与阐述。 展开更多
关键词 加密认证 安全漏洞 日志文件 Syslog协议 存储方法 传输通道 数据加密 网络日志管理
在线阅读 下载PDF
Linux环境下syslog日志管理系统研究 被引量:3
11
作者 孙鹏程 周利华 《电子科技》 2007年第7期72-74,共3页
随着Internet和网络应用系统的发展和普及,网络攻击行为不断升级,严重影响了系统的正常运行,系统安全问题已引起人们的高度重视。多数应用系统通常采用Linux作为服务器操作系统,日志是Linux系统重要的安全特性,对于系统安全极为重要。... 随着Internet和网络应用系统的发展和普及,网络攻击行为不断升级,严重影响了系统的正常运行,系统安全问题已引起人们的高度重视。多数应用系统通常采用Linux作为服务器操作系统,日志是Linux系统重要的安全特性,对于系统安全极为重要。通过它可以方便地查找出系统错误或受到的攻击。基于对Linux Red Hat9.0的研究,文中对syslog协议、日志服务器的建立以及使用logrotate对日志进行轮循管理进行了详细说明,还对Syslog日志管理系统的安全性进行了简要分析,提出了现有Syslog机制存在的问题和未来的发展方向。 展开更多
关键词 分布式环境 日志管理系统 SYSlog 系统安全
在线阅读 下载PDF
基于Windows的Syslog日志系统设计与实现 被引量:2
12
作者 王春彦 朱磊 杨晓朋 《微型机与应用》 2012年第4期11-13,16,共4页
针对传统的单一设备和人工管理方式不能应对日益复杂的网络威胁和挑战,不能及时发现和准确定位网络安全事件,也不能对安全事件可能造成的后果进行准确评估的问题,本文主要讨论如何基于标准Syslog协议,通过对网络设备大量网络日志数据的... 针对传统的单一设备和人工管理方式不能应对日益复杂的网络威胁和挑战,不能及时发现和准确定位网络安全事件,也不能对安全事件可能造成的后果进行准确评估的问题,本文主要讨论如何基于标准Syslog协议,通过对网络设备大量网络日志数据的集中采集,通过SQL代理处理后进行分析,构造一套日志系统,以达到对网络运行状况进行检测的目的。 展开更多
关键词 SYSlog 日志系统 SQL代理 网络安全
在线阅读 下载PDF
LogIDStamp:一个基于IBE的日志身份戳系统
13
作者 陈铁明 宣以广 +1 位作者 潘小明 李伟 《浙江工业大学学报》 CAS 北大核心 2011年第3期317-322,共6页
针对计算机系统和用户行为日志安全问题,提出日志身份戳、日志安全身份戳、前向安全的日志身份戳等概念,并利用基于身份的公钥加密体制(IBE)设计日志安全身份戳系统,实现对日志审计用户的身份追溯和满足前向安全的日志加密等功能.IBE加... 针对计算机系统和用户行为日志安全问题,提出日志身份戳、日志安全身份戳、前向安全的日志身份戳等概念,并利用基于身份的公钥加密体制(IBE)设计日志安全身份戳系统,实现对日志审计用户的身份追溯和满足前向安全的日志加密等功能.IBE加密体制无需PKI公钥证书,可灵活实现基于身份标识的加密和签名.首先在研究IBE加密体制的基础上,实现以密钥管理为中心的IBE应用系统;将IBE应用于日志身份戳的设计,提出了一个基于IBE的安全日志身份戳应用系统LogIDStamp,并分析了系统应用的安全问题;最后实现系统测试,与PKI日志加密作性能比较,体现了安全和性能优势. 展开更多
关键词 IBE 日志加密 日志签名 前向安全 身份戳
在线阅读 下载PDF
A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain
14
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Xin Liu Xiu-Bo Chen Yiying Yu Xiaojun Wang 《Computers, Materials & Continua》 SCIE EI 2022年第9期5429-5441,共13页
With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.Howe... With the increasing popularity of cloud storage,data security on the cloud has become increasingly visible.Searchable encryption has the ability to realize the privacy protection and security of data in the cloud.However,with the continuous development of quantum computing,the standard Public-key Encryption with Keyword Search(PEKS)scheme cannot resist quantumbased keyword guessing attacks.Further,the credibility of the server also poses a significant threat to the security of the retrieval process.This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems.Firstly,we design a lattice-based encryption primitive to resist quantum keyword guessing attacks.Moreover,blockchain is to decentralize the cloud storage platform’s jurisdiction of data.It also ensures that the traceability of keyword retrieval process and maintains the credibility of search result,which malicious platforms are prevented as much as possible from deliberately sending wrong search results.Last but not least,through security analysis,our proposed scheme satisfies the credibility and unforgeability of the keyword ciphertext.The comprehensive performance evaluates that our scheme has certain advantages in terms of efficiency compared with others. 展开更多
关键词 Lattice cryptography searchable encryption blockchain privacy protection log system information security applied cryptography
在线阅读 下载PDF
TRGATLog:基于日志时间图注意力网络的日志异常检测方法 被引量:3
15
作者 陈旭 张硕 +1 位作者 景永俊 王叔洋 《计算机应用研究》 CSCD 北大核心 2024年第4期1034-1040,共7页
为解决现有日志异常检测方法往往只关注定量关系模式或顺序模式的单一特征,忽略了日志时间结构关系和不同特征之间的相互联系,导致较高的异常漏检率和误报率问题,提出基于日志时间图注意力网络的日志异常检测方法。首先,通过设计日志语... 为解决现有日志异常检测方法往往只关注定量关系模式或顺序模式的单一特征,忽略了日志时间结构关系和不同特征之间的相互联系,导致较高的异常漏检率和误报率问题,提出基于日志时间图注意力网络的日志异常检测方法。首先,通过设计日志语义和时间结构联合特征提取模块构建日志时间图,有效整合日志的时间结构关系和语义信息。然后,构造时间关系图注意力网络,利用图结构描述日志间的时间结构关系,自适应学习不同日志之间的重要性,进行异常检测。最后,使用三个公共数据集验证模型的有效性。大量实验结果表明,所提方法能够有效捕获日志时间结构关系,提高异常检测精度。 展开更多
关键词 异常检测 日志分析 图注意力网络 网络安全 日志时间图
在线阅读 下载PDF
HiLog:OpenHarmony的高性能日志系统 被引量:1
16
作者 吴圣垚 王枫 +4 位作者 武延军 凌祥 屈晟 罗天悦 吴敬征 《软件学报》 EI CSCD 北大核心 2024年第4期2055-2075,共21页
日志是计算机系统中记录事件状态信息的的重要载体,日志系统负责计算机系统的日志生成、收集和输出.OpenHarmony是新兴的、面向全设备、全场景的开源操作系统.在所述工作之前,包括日志系统在内OpenHarmony有许多关键子系统尚未构建,而Op... 日志是计算机系统中记录事件状态信息的的重要载体,日志系统负责计算机系统的日志生成、收集和输出.OpenHarmony是新兴的、面向全设备、全场景的开源操作系统.在所述工作之前,包括日志系统在内OpenHarmony有许多关键子系统尚未构建,而OpenHarmony的开源特性使第三方开发者可以为其贡献核心代码.为了解决Open Harmony日志系统缺乏的问题,主要开展如下工作:(1)分析当今主流日志系统的技术架构和优缺点;(2)基于OpenHarmony操作系统的异构设备互联特性设计HiLog日志系统模型规范;(3)设计并实现第1个面向OpenHarmony的日志系统HiLog,并贡献到OpenHarmony主线;(4)对HiLog日志系统的关键指标进行测试和对比试验.实验数据表明,在基础性能方面,HiLog和Log的日志写入阶段吞吐量分别为1500 KB/s和700 KB/s,相比Android日志系统吞吐量提升114%;在日志持久化方面,HiLog可以3.5%的压缩率进行持久化,并且丢包率小于6‰,远低于Log.此外,HiLog还具备数据安全、流量控制等新型实用能力. 展开更多
关键词 操作系统 日志系统 开源软件 数据安全 流量控制
在线阅读 下载PDF
Information Security Problems and Countermeasures in the Process of "Remote Audit"
17
作者 QIAN Liang 《外文科技期刊数据库(文摘版)工程技术》 2021年第3期086-090,共5页
Remote audit is a way of management system audit. Its advantage is to achieve effective and efficient audit purpose by means of information and communication technology (ICT). However, remote audit usually requires IC... Remote audit is a way of management system audit. Its advantage is to achieve effective and efficient audit purpose by means of information and communication technology (ICT). However, remote audit usually requires ICT, and related information security issues also arise. This paper analyzes the related information security problems from the perspective of the information security problems and countermeasures in the process of remote audit, and puts forward the countermeasures to solve the problems, in order to provide reference for controlling the information security risks in the process of remote audit and ensuring the effective and efficient audit purpose. 展开更多
关键词 remote audit information and communication technology (ICT) information security
原文传递
ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security 被引量:1
18
作者 JIANG Hong XIE Mingming +2 位作者 KANG Baoyuan LI Chunqing SI Lin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第4期362-368,共7页
Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a pu... Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost. 展开更多
关键词 ID-based auditing data integrity checking digital signature security bilinear map
原文传递
An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing
19
作者 Yuanhang Zhang Xu An Wang +3 位作者 Weiwei Jiang Mingyu Zhou Xiaoxuan Xu Hao Liu 《Computers, Materials & Continua》 2025年第4期1533-1553,共21页
Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of data.Electronic Health Records(EHRs),which document users’health information,are typically stored on cloud servers... Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of data.Electronic Health Records(EHRs),which document users’health information,are typically stored on cloud servers.However,users’sensitive data would then become unregulated.In the event of data loss,cloud storage providers might conceal the fact that data has been compromised to protect their reputation and mitigate losses.Ensuring the integrity of data stored in the cloud remains a pressing issue that urgently needs to be addressed.In this paper,we propose a data auditing scheme for cloud-based EHRs that incorporates recoverability and batch auditing,alongside a thorough security and performance evaluation.Our scheme builds upon the indistinguishability-based privacy-preserving auditing approach proposed by Zhou et al.We identify that this scheme is insecure and vulnerable to forgery attacks on data storage proofs.To address these vulnerabilities,we enhanced the auditing process using masking techniques and designed new algorithms to strengthen security.We also provide formal proof of the security of the signature algorithm and the auditing scheme.Furthermore,our results show that our scheme effectively protects user privacy and is resilient against malicious attacks.Experimental results indicate that our scheme is not only secure and efficient but also supports batch auditing of cloud data.Specifically,when auditing 10,000 users,batch auditing reduces computational overhead by 101 s compared to normal auditing. 展开更多
关键词 security cloud computing cloud storage recoverable batch auditing
在线阅读 下载PDF
上一页 1 2 58 下一页 到第
使用帮助 返回顶部