期刊文献+
共找到609篇文章
< 1 2 31 >
每页显示 20 50 100
Attribute-Based Encryption for Secure Access Control in Personal Health Records
1
作者 Dakshnamoorthy Manivannan 《Computer Systems Science & Engineering》 2025年第1期533-555,共23页
Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets... Attribute-based Encryption(ABE)enhances the confidentiality of Electronic Health Records(EHR)(also known as Personal Health Records(PHR))by binding access rights not to individual identities,but to user attribute sets such as roles,specialties,or certifications.This data-centric cryptographic paradigm enables highly fine-grained,policydriven access control,minimizing the need for identity management and supporting scalable multi-user scenarios.This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade.It explores the evolution of these schemes,analyzing their design principles,strengths,limitations,and the level of granularity they offer in access control.The review also evaluates the security guarantees,efficiency,and practical applicability of these schemes in real-world healthcare environments.Furthermore,the paper outlines the current state of ABE as a mechanism for safeguarding EHR data and managing user access,while also identifying the key challenges that remain.Open issues such as scalability,revocation mechanisms,policy updates,and interoperability are discussed in detail,providing valuable insights for researchers and practitioners aiming to advance the secure management of health information systems. 展开更多
关键词 Attribute-based encryption attribute-based access control data security cloud security privacypreserving healthcare IoMT security blockchain-based access control
在线阅读 下载PDF
DPZTN:Data-Plane-Based Access Control Zero-Trust Network
2
作者 Jingfu Yan Huachun Zhou Weilin Wang 《Computer Systems Science & Engineering》 2025年第1期499-531,共33页
The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust netw... The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust networks)have demonstrated significant advancements in constructing trust-centric frameworks,most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities.Furthermore,current ZTN designs generally do not facilitate dynamic assessment of user reputation.To address these limitations,this study proposes a DPZTN(Data-plane-based Zero Trust Network).DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane.Additionally,blockchain infrastructure is used to enable decentralized identity authentication and distributed access control.A pivotal element within the proposed framework is ZTNE(Zero-Trust Network Element),which executes access control policies and performs real-time user traffic inspection.To enable dynamic and fine-grained evaluation of user trustworthiness,this study introduces BBEA(Bayesian-based Behavior Evaluation Algorithm).BBEA provides a framework for continuous user behavior analysis,supporting adaptive privilege management and behavior-informed access control.Experimental results demonstrate that ZTNE combined with BBEA,can effectively respond to both individual and mixed attack types by promptly adjusting user behavior scores and dynamically modifying access privileges based on initial privilege levels.Under conditions supporting up to 10,000 concurrent users,the control system maintains approximately 65%CPU usage and less than 60%memory usage,with average user authentication latency around 1 s and access control latency close to 1 s. 展开更多
关键词 Zero trust network data plane bayesian-based behavior evaluation blockchain-based access control security functions
在线阅读 下载PDF
Study on Mandatory Access Control in a Secure Database Management System
3
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance integrity cluster
在线阅读 下载PDF
Security and Privacy Frameworks for Access Control Big Data Systems 被引量:3
4
作者 Paolina Centonze 《Computers, Materials & Continua》 SCIE EI 2019年第5期361-374,共14页
In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have t... In the security and privacy fields,Access Control(AC)systems are viewed as the fundamental aspects of networking security mechanisms.Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data(BD)processing cluster frameworks,which are adopted to manage yottabyte of unstructured sensitive data.For instance,Big Data systems’privacy and security restrictions are most likely to failure due to the malformed AC policy configurations.Furthermore,BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with the“three Vs”(Velocity,Volume,and Variety)attributes,without planning security consideration,which are considered to be patch work.Some of the BD“three Vs”characteristics,such as distributed computing,fragment,redundant data and node-to node communication,each with its own security challenges,complicate even more the applicability of AC in BD.This paper gives an overview of the latest security and privacy challenges in BD AC systems.Furthermore,it analyzes and compares some of the latest AC research frameworks to reduce privacy and security issues in distributed BD systems,which very few enforce AC in a cost-effective and in a timely manner.Moreover,this work discusses some of the future research methodologies and improvements for BD AC systems.This study is valuable asset for Artificial Intelligence(AI)researchers,DB developers and DB analysts who need the latest AC security and privacy research perspective before using and/or improving a current BD AC framework. 展开更多
关键词 Big data access control distributed systems SECURITY PRIVACY
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
5
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD data STORAGE CLOUD Service PROVIDER Formula-Based CLOUD data access Control Multi-Agent System and secure Java Agent Development Framework
在线阅读 下载PDF
Secure Remote Access IPSEC Virtual Private Network to University Network System 被引量:1
6
作者 Gajendra Sharma 《Journal of Computer Science Research》 2021年第1期16-27,共12页
With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construct... With the popularity of the Internet and improvement of information technology,digital information sharing increasingly becomes the trend.More and More universities pay attention to the digital campus,and the construction of digital library has become the focus of digital campus.A set of manageable,authenticated and secure solutions are needed for remote access to make the campus network be a transit point for the outside users.Remote Access IPSEC Virtual Private Network gives the solution of remote access to e-library resources,networks resources and so on very safely through a public network.It establishes a safe and stable tunnel which encrypts the data passing through it with robust secured algorithms.It is to establish a virtual private network in Internet,so that the two long-distance network users can transmit data to each other in a dedicated network channel.Using this technology,multi-network campus can communicate securely in the unreliable public internet. 展开更多
关键词 IPSEC VPN Network Communication data ENCRYPTION Integrity authentication Remote access UNIVERSITY Security Server CLIENT PEER
在线阅读 下载PDF
A Multilevel Secure Relation-Hierarchical Data Model for a Secure DBMS
7
作者 朱虹 冯玉才 《Journal of Modern Transportation》 2001年第1期8-16,共9页
A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lowe... A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lower layer relationalintegrity is presented after we analyze and eliminate the covert channels caused by the database integrity.Two SQL statements are extended to process polyinstantiation in the multilevel secure environment.The system based on the multilevel secure relation hierarchical data model is capable of integratively storing and manipulating complicated objects ( e.g. , multilevel spatial data) and conventional data ( e.g. , integer, real number and character string) in multilevel secure database. 展开更多
关键词 dataBASES data structure data models secure DBMS covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level integrity cluster index
在线阅读 下载PDF
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
8
作者 Aodi Liu Na Wang +3 位作者 Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
在线阅读 下载PDF
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
9
作者 Zhixin Li Lei Liu Kin Wang 《国际计算机前沿大会会议论文集》 2018年第1期33-33,共1页
在线阅读 下载PDF
利用NTBACKUP工具实现电子病历文本的自动备份 被引量:2
10
作者 杨栋 苏小刚 任志刚 《医疗卫生装备》 CAS 2008年第4期47-48,共2页
目的:制定完善、可靠的电子病历文本备份方案,保证电子病历信息数据的安全。方法:根据医院信息系统运行负载的变化规律和电子病历文本文件的存储特点,利用Windows自带的NTBACKUP备份工具和批处理技术实施备份。结果:制定了自动、定时执... 目的:制定完善、可靠的电子病历文本备份方案,保证电子病历信息数据的安全。方法:根据医院信息系统运行负载的变化规律和电子病历文本文件的存储特点,利用Windows自带的NTBACKUP备份工具和批处理技术实施备份。结果:制定了自动、定时执行的备份计划,有效地保证了电子病历信息的数据安全。结论:该备份方法基本满足了电子病历备份的要求,但仍有改进的余地。 展开更多
关键词 电子病历 数据安全 备份
暂未订购
Veritas NetBackup备份软件在数字图书馆中的应用 被引量:1
11
作者 陈宗仁 《科技情报开发与经济》 2007年第4期7-9,共3页
通过分析不同数据的备份方式,以及现代数字图书馆网络设备和数据应用分布情况,详细讲述了Veritas NetBackup备份软件在广东外语外贸大学图书馆的应用实施过程以及管理操作的方法,阐述了Veritas NetBackup备份软件在数字图书馆中的重要... 通过分析不同数据的备份方式,以及现代数字图书馆网络设备和数据应用分布情况,详细讲述了Veritas NetBackup备份软件在广东外语外贸大学图书馆的应用实施过程以及管理操作的方法,阐述了Veritas NetBackup备份软件在数字图书馆中的重要作用。 展开更多
关键词 数据安全:数据备份 备份策 VERITAS NETbackup
在线阅读 下载PDF
浅谈基于VB与ACCESS的应用程序体系的安全问题 被引量:1
12
作者 黄雅琼 《电脑知识与技术》 2013年第11X期7398-7399,7407,共3页
VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和V... VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和VB相结合的应用,是一种实用性很强的技术方案。数据库的主要任务是存储信息和管理信息,而这些信息往往对于人来说极具隐秘性,所以这些信息的安全问题成为人们最关心的问题之一。数据库作为信息的聚集体,它的安全性问题也就成为了信息安全的最大挑战。Access是一种关系型数据库管理系统,它是一种桌面应用程序,并不是Web应用程序,所以Access在网络环境中会存在很多安全隐患,该文从这些安全隐患入手,做了一些探讨,并且提出了几种解决方案,希望能增强信息管理体系的数据库安全性。 展开更多
关键词 access VB 数据库 信息管理系统 数据安全
在线阅读 下载PDF
基于DataGuard的Oracle RAC高校数据保护研究
13
作者 李茜 《广西民族大学学报(自然科学版)》 CAS 2013年第2期67-71,共5页
数据是高校管理信息化产生的最重要的无形资产,数据的丢失或者损坏都将极大地损害教学、管理和科研工作的正常开展.Oracle RAC是目前使用最为广泛的数据库集群化管理方式,在此基础上开展DataGuard数据保护技术的应用研究,可以弥补集群... 数据是高校管理信息化产生的最重要的无形资产,数据的丢失或者损坏都将极大地损害教学、管理和科研工作的正常开展.Oracle RAC是目前使用最为广泛的数据库集群化管理方式,在此基础上开展DataGuard数据保护技术的应用研究,可以弥补集群数据库环境在数据容灾、备份和故障恢复方面的不足,提升数据的安全性,确保高校各类应用系统的正常运行. 展开更多
关键词 数据保护 dataGUARD 数据安全 数据备份 数据恢复
在线阅读 下载PDF
广播发射台站在数据安全上的运维方式探索
14
作者 刘娜 《网络安全与数据治理》 2026年第1期9-13,共5页
基层广播发射台站数据安全运维的核心痛点在于“有限资源与差异化数据保护需求不匹配”,分类分级备份机制是解决该矛盾的关键技术路径。针对发射台站“数据聚焦设备运行与指令交互”的核心属性,构建“数据安全等级备份技术参数”映射模... 基层广播发射台站数据安全运维的核心痛点在于“有限资源与差异化数据保护需求不匹配”,分类分级备份机制是解决该矛盾的关键技术路径。针对发射台站“数据聚焦设备运行与指令交互”的核心属性,构建“数据安全等级备份技术参数”映射模型,通过备份频率系数、冗余度及RTO达标率优化三类公式计算,并结合基层台站实测数据,验证公式可行性。研究表明,通过量化参数管控,可使一级数据备份成功率、RTO达标率提升至理想的数值,为基层发射台站提供可落地的分类分级备份技术方案。 展开更多
关键词 数据安全运维 分类分级备份 备份频率系数 RTO达标率
在线阅读 下载PDF
电子信息系统中的数据隐私保护与加密技术研究
15
作者 杨洪金 《计算机应用文摘》 2026年第2期241-242,245,共3页
文章从数据隐私保护的重要性角度出发,系统分析了当前常用的加密技术及其在电子信息系统中的应用,并提出了一种结合对称加密、非对称加密和访问控制策略的综合保护方案。实践应用表明,该方案在保证数据安全性和隐私性的同时,对系统性能... 文章从数据隐私保护的重要性角度出发,系统分析了当前常用的加密技术及其在电子信息系统中的应用,并提出了一种结合对称加密、非对称加密和访问控制策略的综合保护方案。实践应用表明,该方案在保证数据安全性和隐私性的同时,对系统性能的影响程度较低,能够有效应对电子信息系统中潜在的数据泄露风险。 展开更多
关键词 电子信息系统 数据隐私 加密技术 信息安全 访问控制
在线阅读 下载PDF
基于零信任架构的数据访问控制优化研究
16
作者 李烨 《移动信息》 2026年第1期175-177,共3页
为应对传统数据访问控制中边界防护模式不佳、访问控制精度低以及内部威胁防护欠缺的问题,文中提出了一种基于零信任架构的数据访问控制优化方法。具体地,设计了基于敏感度分级的访问控制体系,并引入实时验证与动态决策机制,以增强系统... 为应对传统数据访问控制中边界防护模式不佳、访问控制精度低以及内部威胁防护欠缺的问题,文中提出了一种基于零信任架构的数据访问控制优化方法。具体地,设计了基于敏感度分级的访问控制体系,并引入实时验证与动态决策机制,以增强系统对多样化安全威胁的响应能力。研究表明,零信任架构不仅可提升数据保护的精细度和实时性,还能有效降低安全事件的发生频率,提升了整体系统的安全性和效率。 展开更多
关键词 零信任架构 数据访问控制 权限管理 异常检测 安全性
在线阅读 下载PDF
ASP+Access数据库的安全隐患与解决方案
17
作者 李佳 季秀兰 《电脑学习》 2006年第6期43-44,共2页
分析了用ASP和Access数据库构造网站中的安全隐患,并探讨了相应的解决方法。
关键词 ASP access ODBC数据源 安全随患 解决方案
在线阅读 下载PDF
ASP+Access安全性探讨
18
作者 史丽琼 《现代计算机》 2007年第11期77-78,共2页
随着全球信息化的发展,网络的发展也应跟上时代的步伐。网络的发展在网页上得到了很好的体现,ASP脚本语言的出现就是其中的佼佼者。ASP使用的ActiveX技术基于开放设计环境,用户可以自己定义和制作组件加入其中,使自己的动态网页几乎具... 随着全球信息化的发展,网络的发展也应跟上时代的步伐。网络的发展在网页上得到了很好的体现,ASP脚本语言的出现就是其中的佼佼者。ASP使用的ActiveX技术基于开放设计环境,用户可以自己定义和制作组件加入其中,使自己的动态网页几乎具有无限的扩充能力。不过同时也为网络安全带来了隐患,对ASP+Access安全性的改进非常必要。 展开更多
关键词 access数据库 ASP 安全漏洞 ODBC数据源
在线阅读 下载PDF
Access数据库的安全性分析 被引量:3
19
作者 李楠 张世星 《信息技术》 2007年第2期65-66,共2页
随着Access数据库的应用越来越广,对其安全性的需求也越来越高,针对现有Access数据库文件安全技术的局限与不足,提出一种新的数据库安全策略,可以有效解决Access数据库的安全问题。
关键词 access 数据库 安全策略
在线阅读 下载PDF
Data Hiding and Security for XMLDatabase: A TRBAC-Based Approach 被引量:1
20
作者 ZHANGWan-song SUNWei LIUDa-xin 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期293-296,共4页
In order to cope with varying protection granularity levels of XML(extensible Markup Language) documents, we propose a TXAC (Two-level XML. Access Control) framework,in which an extended TRBAC ( Temporal Role-Based Ac... In order to cope with varying protection granularity levels of XML(extensible Markup Language) documents, we propose a TXAC (Two-level XML. Access Control) framework,in which an extended TRBAC ( Temporal Role-Based Access Control) approach is proposed to deal withthe dynamic XML data With different system components, LXAC algorithm evaluates access requestsefficiently by appropriate access control policy in dynamic web environment. The method is aflexible and powerful security system offering amulti-level access control solution. 展开更多
关键词 XML data access control data security
在线阅读 下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部