期刊文献+
共找到7,305篇文章
< 1 2 250 >
每页显示 20 50 100
On large language models safety,security,and privacy:A survey 被引量:3
1
作者 Ran Zhang Hong-Wei Li +2 位作者 Xin-Yuan Qian Wen-Bo Jiang Han-Xiao Chen 《Journal of Electronic Science and Technology》 2025年第1期1-21,共21页
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.De... The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.Despite their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant challenges.These challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy leakage.Previous works often conflated safety issues with security concerns.In contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of LLMs.Building on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in LLMs.Additionally,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats. 展开更多
关键词 Large language models Privacy issues Safety issues security issues
在线阅读 下载PDF
When Software Security Meets Large Language Models:A Survey 被引量:2
2
作者 Xiaogang Zhu Wei Zhou +3 位作者 Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期317-334,共18页
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research. 展开更多
关键词 Large language models(LLMs) software analysis software security software testing
在线阅读 下载PDF
The Security of Using Large Language Models:A Survey With Emphasis on ChatGPT 被引量:2
3
作者 Wei Zhou Xiaogang Zhu +4 位作者 Qing-Long Han Lin Li Xiao Chen Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期1-26,共26页
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec... ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users. 展开更多
关键词 Artificial intelligence(AI) ChatGPT large language models(LLMs) security
在线阅读 下载PDF
Pursuing the Asian Security Model:Strategic Focuses and Practical Approaches
4
作者 Huang Dahui 《Contemporary International Relations》 2025年第4期26-35,共10页
Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for... Recently,the 2025 Central Conference on Work Related to Neighboring Countries was held in Beijing.As an important theoretical innovation,the conference emphasized for the first time pursuing“the model of security for Asia that features sharing weal and woe,seeking common ground while shelving differences,and prioritizing dialogue and consultation.”1 This fully demonstrates that China prioritizes neighborhood on its diplomatic agenda,regards security and stability in its neighborhood as a core strategic support,and is ready to collaborate with neighboring countries for a future of shared peace,development,and prosperity. 展开更多
关键词 security stability security model model security Asian security common ground dialogue sharing weal woe neighborhood diplomacy
在线阅读 下载PDF
NeuroShield:A Biomimetic Security Model for Web Applications Based on Neural Control Mechanisms
5
作者 Li Tao Bian Qingyuan Hu Aiqun 《China Communications》 2025年第9期226-243,共18页
In response to the current gaps in ef-fective proactive defense methods within applica-tion security and the limited integration of security components with applications,this paper proposes a biomimetic security model... In response to the current gaps in ef-fective proactive defense methods within applica-tion security and the limited integration of security components with applications,this paper proposes a biomimetic security model,called NeuroShield,specifically designed for web applications.Inspired by the“perception-strategy-effect-feedback”mechanism of the human nervous control system,the model inte-grates biomimetic elements akin of neural receptors and effectors into applications.This integration fa-cilitates a multifaceted approach to security:enabling data introspection for detailed perception and regula-tion of application behavior,providing proactive de-fense capabilities to detect and block security risks in real-time,and incorporating feedback optimization to continuously adjust and enhance security strategies based on prevailing conditions.Experimental results affirm the efficacy of this neural control mechanism-based biomimetic security model,demonstrating a proactive defense success rate exceeding 95%,thereby offering a theoretical and structural foundation for biomimetic immunity in web applications. 展开更多
关键词 active security biometric security security model software security
在线阅读 下载PDF
The Asian Security Model Provides a New Paradigm for Resolving the Security Dilemmas in Asia
6
作者 Liu Qing 《Contemporary International Relations》 2025年第4期18-25,共8页
Security is the cor nerstone of a country's peace and stability and the prerequisite for its survival and development.All countries around the world regard security as their top priority.Since most Asian countries... Security is the cor nerstone of a country's peace and stability and the prerequisite for its survival and development.All countries around the world regard security as their top priority.Since most Asian countries suffered from colonial aggression and plundering for a long time in history,they as a whole attach special importance to national security. 展开更多
关键词 national security colonial aggression plundering peace stability security priority colonial aggression security dilemmas Asian security model
在线阅读 下载PDF
TIPS:Tailored Information Extraction in Public Security Using Domain-Enhanced Large Language Model
7
作者 Yue Liu Qinglang Guo +1 位作者 Chunyao Yang Yong Liao 《Computers, Materials & Continua》 2025年第5期2555-2572,共18页
Processing police incident data in public security involves complex natural language processing(NLP)tasks,including information extraction.This data contains extensive entity information—such as people,locations,and ... Processing police incident data in public security involves complex natural language processing(NLP)tasks,including information extraction.This data contains extensive entity information—such as people,locations,and events—while also involving reasoning tasks like personnel classification,relationship judgment,and implicit inference.Moreover,utilizing models for extracting information from police incident data poses a significant challenge—data scarcity,which limits the effectiveness of traditional rule-based and machine-learning methods.To address these,we propose TIPS.In collaboration with public security experts,we used de-identified police incident data to create templates that enable large language models(LLMs)to populate data slots and generate simulated data,enhancing data density and diversity.We then designed schemas to efficiently manage complex extraction and reasoning tasks,constructing a high-quality dataset and fine-tuning multiple open-source LLMs.Experiments showed that the fine-tuned ChatGLM-4-9B model achieved an F1 score of 87.14%,nearly 30%higher than the base model,significantly reducing error rates.Manual corrections further improved performance by 9.39%.This study demonstrates that combining largescale pre-trained models with limited high-quality domain-specific data can greatly enhance information extraction in low-resource environments,offering a new approach for intelligent public security applications. 展开更多
关键词 Public security information extraction large language model prompt engineering
在线阅读 下载PDF
Special Topic on Security of Large Models
8
作者 SU Zhou DU Linkang 《ZTE Communications》 2025年第3期1-2,共2页
Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved percepti... Large models,such as large language models(LLMs),vision-language models(VLMs),and multimodal agents,have become key elements in artificial intelli⁃gence(AI)systems.Their rapid development has greatly improved perception,generation,and decision-making in various fields.However,their vast scale and complexity bring about new security challenges.Issues such as backdoor vulnerabilities during training,jailbreaking in multimodal rea⁃soning,and data provenance and copyright auditing have made security a critical focus for both academia and industry. 展开更多
关键词 large modelssuch security multimodal agentshave multimodal rea soningand large language models llms vision language data provenance copyright auditing backdoor vulnerabilities vision language models
在线阅读 下载PDF
FORMAL PROOF OF RELATIVE STRENGTH OF SECURITY AMONG ECK2007 MODEL AND OTHER PROOF MODELS FOR KEY AGREEMENT PROTOCOLS 被引量:2
9
作者 夏金月 王建东 +2 位作者 方黎明 任勇军 卞仕柱 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第4期282-288,共7页
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ... The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided. 展开更多
关键词 CRYPTOGRAPHY security data key agreement protocol proof model
在线阅读 下载PDF
APPLICATION OF FUZZY OPTIMIZATION MODEL IN ECOLOGICAL SECURITY PRE-WARNING 被引量:13
10
作者 WUKai-ya HUShu-heng SUNShi-qun 《Chinese Geographical Science》 SCIE CSCD 2005年第1期29-33,共5页
Ecological security is a vital problem that people all over the world today have to face and solve, and the situation of ecological security is getting more and more severe and has begun to impede heavily the sustaina... Ecological security is a vital problem that people all over the world today have to face and solve, and the situation of ecological security is getting more and more severe and has begun to impede heavily the sustainable development of social economy. Ecological environment pre-warning has become a hotspot for the modern environment science. This paper introduces the theories of ecological security pre-warning and tries to constitute a pre-warning model of ecological security. In terms of pressure-state-response model, the pre-warning guide line of ecological security is constructed while the pre-warning degree judging model of ecological security is established based on fuzzy optimization. As a case, the model is used to assess the present condition pre-warning of the ecological security of Anhui Province. The result is in correspondence with the real condition: the ecological security situations of 8 cities are dangerous and 9 cities are secure. The result shows that this model is scientific and effective for regional ecological security pre-warning. 展开更多
关键词 ecological security pre-warning fuzzy optimization pre-warning model Anhui Province
在线阅读 下载PDF
Comprehensive security risk factor identification for small reservoirs with heterogeneous data based on grey relational analysis model 被引量:6
11
作者 Jing-chun Feng Hua-ai Huang +1 位作者 Yao Yin Ke Zhang 《Water Science and Engineering》 EI CAS CSCD 2019年第4期330-338,共9页
Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when ... Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data. 展开更多
关键词 security risk factor identification Heterogeneous data Grey relational analysis model Relational degree Information entropy Conditional entropy Small reservoir GUANGXI
在线阅读 下载PDF
Network Security Situation Prediction Based on Improved Adaptive Grey Verhulst Model 被引量:4
12
作者 胡威 李建华 +1 位作者 陈秀真 蒋兴浩 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第4期408-413,共6页
Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing r... Network security situation is a hot research topic in the field of network security. Whole situation awareness includes the current situation evaluation and the future situation prediction. However, the now-existing research focuses on the current situation evaluation, and seldom discusses the future prediction. Based on the historical research, an improved grey Verhulst model is put forward to predict the future situation. Aiming at the shortages in the prediction based on traditional Verhulst model, the adaptive grey parameters and equal- dimensions grey filling methods are proposed to improve the precision. The simulation results prove that the scheme is efficient and applicable. 展开更多
关键词 network security situation situation prediction grey theory grey Verhulst model
原文传递
A Fuzzy Set-Based Approach for Model-Based Internet-Banking System Security Risk Assessment 被引量:3
13
作者 LI Hetian LIU Yun HE Dequan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1869-1872,共4页
A fuzzy set-based evaluation approach is demonstrated to assess the security risks for internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify... A fuzzy set-based evaluation approach is demonstrated to assess the security risks for internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify the behavior and state of the system on the base of analyzing the existing qualitative risk assessment methods. And a quantitative method based on fuzzy set is used to measure security risks of the system, A case study was performed on the WEB server of the Internet-banking System using fuzzy-set based assessment algorithm to quantitatively compute the security risk severity. The numeric result also provides a method to decide the most critical component which should amuse the system administrator enough attention to take the appropriate security measure or controls to alleviate the risk severity. The experiments show this method can be used to quantify the security properties for the Internet-banking System in practice. 展开更多
关键词 risk assessment system security fuzzy set unified modeling language
在线阅读 下载PDF
Evaluation on Urban Land Ecological Security Based on the PSR Model and Matter-Element Analysis: A Case Study of Zhuhai, Guangdong, China 被引量:4
14
作者 LI Shuang 《Journal of Landscape Research》 2019年第3期82-88,92,共8页
As one of the Special Economic Zones since the reform and opening up, Zhuhai has developed during the past 30 years. Its economic development, industrial structure and ecological environment have undergone great chang... As one of the Special Economic Zones since the reform and opening up, Zhuhai has developed during the past 30 years. Its economic development, industrial structure and ecological environment have undergone great changes. Research on changes in Zhuhai’s land ecological security is of great significance. Using relevant data from 2007-2012, this study established a land ecological security assessment system based on the PSR conceptual framework model. The system contained 18 indicators from 3 aspects according to the concrete features of Zhuhai. Then we used the matterelement analysis and the improved entropy weight to analyze and evaluate the land ecological security of Zhuhai. The results showed that: from 2007 to 2012, the levels of the land ecological security of Zhuhai were “secure”, and the value increased year by year;as the land ecological security response value increased, Zhuhai was capable of solving land ecosystem problems. However, it should be noted that the structure of land ecosystem in Zhuhai has not formed and that rapid expansion of construction land has caused the shortage of cultivated land and other issues. Measures should be taken to control the construction area, improve land intensive utilization and improve the land ecological security. 展开更多
关键词 Land ECOLOGICAL security PSR model MATTER-ELEMENT analysis Improved ENTROPY WEIGHT Zhuhai
在线阅读 下载PDF
Ecological Security Assessment in County Area Based on P-S-R Model——A Case Study of Ningwu County,Shanxi Province 被引量:3
15
作者 Feng Xufang Liu Jingmei Zhao Lijuan 《Meteorological and Environmental Research》 CAS 2014年第8期13-15,19,共4页
To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and cons... To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and considerable human impacts. Taking Ningwu as the study area and using variation coefficient method to determine the weights of the indices, we built ecological security pattern based on Pressure-State-Response (P-S-R) Model of Organization for Economic Cooperation and Development. The ecological security status was evaluated by calculating eco-security index (ESI) with socio-economic statistical data of Ningwu during 2001 -2010. The results showed that the situation of eco-security had been improved from heavy alarm to relative safety during 2001 -2010. It reflected that the ecological economic system in Ningwu County tended to be relaxed constantly after experienced a sharp conflict between ecological environment and economic growth. The ecological safety awareness was growing, however, by force of the objective requirements of population growth and economic development, the situation of ecological security was still unstable. 展开更多
关键词 Ecological security P-S-R model ES/ Ningwu County China
在线阅读 下载PDF
Ecological risk assessment and ecological security pattern optimization in the middle reaches of the Yellow River based on ERI+MCR model 被引量:9
16
作者 YANG Lian'an LI Yali +2 位作者 JIA Lujing JI Yongfan HU Guigui 《Journal of Geographical Sciences》 SCIE CSCD 2023年第4期823-844,共22页
The middle reaches of the Yellow River represent an important area for the protection and development of the Yellow River Basin.Most of the area of the river basin is within the Loess Plateau,which establishes it as a... The middle reaches of the Yellow River represent an important area for the protection and development of the Yellow River Basin.Most of the area of the river basin is within the Loess Plateau,which establishes it as a fragile ecological environment.Firstly,using high-resolution data of land use in the watershed from the past 30 years,landscape ecological risk(LER)sample units are defined and an ecological risk index(ERI)model is constructed.Kriging interpolation is used to display the LER spatial patterns,and the temporal and spatial evolution of risk is examined.Secondly,the spatial evolution of land use landscape change(LULC)is analyzed,and the correlation between land use landscape and ecological risk is discussed.Finally,Based on the LER model,a risk-based minimum cumulative resistance(MCR)model is established,and a comprehensive protection and management network system for the ecological source-corridor-node system designed.The results suggest that in the past 30 years,LER has a high spatial correlation and areas with extremely high ecological risks are concentrated in northwest and southeast areas of the region,of which the northwest area accounts for the highest proportion.Risk intensity is closely related to the spatial pattern of land use landscape.ERI values of forestland,grasslands,and unused land and farmland are low,medium,and high,respectively.The trend of risk evolution is“overall improvement and partial deterioration”.Man-made construction and exploitation is the most direct reason for the increase of local ecological risks.The high ecological-risk areas in the northwest are dominated by deserts which reduce excessive interference by human activities on the natural landscape.Recommendations are:high-quality farmland should be protected;forestland should be restored and rebuilt;repair and adjust the existing ecosystem to assist in landscape regeneration and reconstruction;utilize the overall planning vision of“mountain,water,forest,field,lake,grass,sand”to design a management project at the basin scale;adhere to problem-oriented and precise policy implementation. 展开更多
关键词 landscape ecological risk MCR model ecological security pattern middle reaches of the Yellow River
原文传递
Research on Assessment Model of Information System Security Based on Various Security Factors 被引量:5
17
作者 林梦泉 朱赟 +1 位作者 王强民 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第3期405-409,共5页
With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit... With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM. 展开更多
关键词 information system security factors five-attribute model(FAM) risk assessment
在线阅读 下载PDF
Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model 被引量:4
18
作者 Xiaozhou Li Zhenggang Xu +3 位作者 Yuanyuan Fu Qi Jin Yunlin Zhao Neal NXiong 《Computers, Materials & Continua》 SCIE EI 2021年第10期985-1001,共17页
Today,resource depletion threatens a number of resource-based cities in China.The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of... Today,resource depletion threatens a number of resource-based cities in China.The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resource-exhausted cities.Using 23 indicators,this study evaluated the ecological security status and development trends of 21 resource-exhausted cities in China from 2011 to 2017.The results showed that from 2011 to 2015,the overall ecological security of this type of city was low,with over 60%of the cities at an unsafe level.However,ecological security improved rapidly after 2016,and by 2017,all of the cities had reached the critical safety level.The top 10 indicators of ecological security included industrial sulfur dioxide emissions,water supply,agricultural fertilizer application,and forest coverage.These 10 indicators’cumulative contribution to ecological security was 48.3%;among them,reducing industrial sulfur dioxide emissions contributed the most at 5.7%.These findings can help governments better understand the ecological security status of resource-exhausted cities,and it can provide a reference for the allocation of funds and other resources to improve the ecological safety of these cities. 展开更多
关键词 Ecological security PSR model EVALUATION resource-exhausted cities
在线阅读 下载PDF
A Cloud Computing Security Model Based on Noninterference 被引量:1
19
作者 Lü Congdong QIAN Gang CHEN Tao 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第3期194-200,共7页
In cloud computing, the risk of data leakage exists between users and virtual machines. Whether it is direct or indirect data leakage, it can be regarded as illegal information flow. Methods such as access control mod... In cloud computing, the risk of data leakage exists between users and virtual machines. Whether it is direct or indirect data leakage, it can be regarded as illegal information flow. Methods such as access control models can control the information flow rather than the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing. Typical noninterference models are not suitable to verificate information flow in cloud computing. When concurrent access actions execute in the cloud architecture, security domains do not affect each other, because there is no information flow between security domains. Based on this, we propose noninterference for cloud architecture in which concurrent access and sequential access coexist. When the sequential actions execute, the information flow between security domains can flow in accordance with established rules. When concurrent access actions execute, there should not be the information flow between security domains. 展开更多
关键词 CLOUD COMPUTING security information flow security NONINTERFERENCE NONINTERFERENCE modelS
原文传递
Information Flow Security Models for Cloud Computing 被引量:3
20
作者 Congdong Lv Ji Zhang +1 位作者 Zhoubao Sun Gang Qian 《Computers, Materials & Continua》 SCIE EI 2020年第12期2687-2705,共19页
Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between u... Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between users and virtual machines.Whether direct or indirect data leakage,it can be regarded as illegal information flow.Methods,such as access control models can control the information flow,but not the covert information flow.Therefore,it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture.Typical noninterference models are not suitable to certificate information flow in cloud computing architecture.In this paper,we propose several information flow models for cloud architecture.One model is for transitive cloud computing architecture.The others are for intransitive cloud computing architecture.When concurrent access actions execute in the cloud architecture,we want that security domain and security domain do not affect each other,that there is no information flow between security domains.But in fact,there will be more or less indirect information flow between security domains.Our models are concerned with how much information is allowed to flow.For example,in the CIP model,the other domain can learn the sequence of actions.But in the CTA model,the other domain can’t learn the information.Which security model will be used in an architecture depends on the security requirements for that architecture. 展开更多
关键词 Cloud computing security information flow security NONINTERFERENCE noninterference models
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部