期刊文献+
共找到682篇文章
< 1 2 35 >
每页显示 20 50 100
ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security 被引量:1
1
作者 JIANG Hong XIE Mingming +2 位作者 KANG Baoyuan LI Chunqing SI Lin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第4期362-368,共7页
Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a pu... Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost. 展开更多
关键词 ID-based auditing data integrity checking digital signature security bilinear map
原文传递
SMS Notifying Design in Intra-Day Scheduling Security Check System
2
作者 Cui-Hui Yan Licheng Sha +1 位作者 Sai Dai Hai-Dong Zhao 《Energy and Power Engineering》 2017年第4期535-543,共9页
In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into o... In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source. 展开更多
关键词 security checking Intra-Day SCHEDULING SMS Notifying
暂未订购
Countermeasures for Establishing a Long-term Security Mechanism for Landless Farmers
3
作者 Jiefang ZHU 《Asian Agricultural Research》 2020年第1期25-27,31,共4页
In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a ... In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development. 展开更多
关键词 Landless FARMERS long-term security MECHANISM COUNTERMEASURES
在线阅读 下载PDF
Check Point新安全加速模块整合Security Core技术
4
《电信科学》 北大核心 2012年第6期124-124,共1页
全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技... 全球互联网安全领域首屈一指的Check Point软件技术有限公司日前宣布,推出一款新的安全加速模块(securitv acceleration module),旨在满足客户对高性能和低时延环境的独特需求。安全加速模块采用Check Point先进的Security Core技术,帮助客户防火墙实现高达110Gbit/s的吞吐量和不到5μs的时延,从而实现业界性能最高的双架单元防火墙。 展开更多
关键词 security 互联网安全 check Point 软件技术 模块 10GBIT/S 客户防火墙
在线阅读 下载PDF
Check Point Endpoint Security正式上市
5
《信息网络安全》 2008年第11期71-71,共1页
Check Point近日宣布,其Check Point Endpoint SecurityTM最新版本正式上市,这是首款单一代理程序的端点安全解决方案,它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、
关键词 check Point security 上市 安全解决方案 网络访问控制 最新版本 代理程序
在线阅读 下载PDF
Check Point推出UTM-1 Total Security1070及2070
6
作者 潘荧莹 《机械制造》 2008年第12期57-57,共1页
在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低... 在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低的拥有总成本(TCO)。 展开更多
关键词 TOTAL check Point security 互联网安全 网络安全保护 软件技术 性能要求
在线阅读 下载PDF
Check Point推出Endpoint Security R72树立端点安全新标准
7
《电子与电脑》 2009年第8期59-59,共1页
Check Point软件技术有限公司宣布推出Check Point Endpoint Security R72,这是业界唯一专门为端点安全而设计的单一代理的最新版本。这款新方案结合了多种革新性技术,令用户使用时更感简便的同时大幅度提高端点安全。
关键词 security check Point 安全 端点 标准 软件技术 最新版本
在线阅读 下载PDF
Check Point推出Endpoint Security R72
8
《电信技术》 2009年第8期32-32,共1页
Check Point软件技术有限公司宣布推出Check Point Endpoint Security R72。这是一种专门为端点安全而设计的单一代理。新方案结合了多种新技术,在提高用户使用方便性的同时大幅度提高端点安全。
关键词 security check Point 软件技术 方便性 安全 端点 代理
在线阅读 下载PDF
Check Point推出UTM-1 Total Security 1070及2070
9
《计算机安全》 2008年第8期106-106,共1页
Check Point软件技术有限公司宣布推出UTM-1 Total Security 系列的两款最新型号1070及2070,为客户和伙伴提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低的拥有总成本(TCO)。
关键词 security TOTAL check Point 网络安全保护 软件技术 性能要求 总成本
在线阅读 下载PDF
Check Point推出UTM-1 Total Security 1070及2070
10
《电信技术》 2008年第8期65-65,共1页
Check Point软件技术有限公司近日推出UTM-1 Total Security系列产品的两款最新型号——1070及2070,为客户和合作伙伴提供更适合安全及性能要求的方案选择。
关键词 security check POINT TOTAL 软件技术 性能要求 合作伙伴 客户
在线阅读 下载PDF
i-Security联手Check Point共推i-Security Connectra
11
《中国金融电脑》 2005年第12期83-83,共1页
本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推... 本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推出即受到业界广泛关注。 展开更多
关键词 check Point security 硬件平台 软件产品 安全产品 代理商 SSL 网关
在线阅读 下载PDF
Check Point推出UTM-1 Total Security设备
12
《计算机安全》 2008年第1期10-10,共1页
Check Point软件技术有限公司日前宣布推出UTM-1 Total Security安全设备该系列新品通过单一、易于管理、具备成本效益的平台,为用户提供全面、功能强大的网络安全保护。
关键词 security check Point TOTAL 安全设备 网络安全保护 软件技术 成本效益
在线阅读 下载PDF
Check Point推出Check Point Endpoint Security产品
13
《电信技术》 2008年第3期57-57,共1页
Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功... Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功能的全方位端点安全解决方案。这款解决方案为个人电脑提供卓越的安全保护,而且无需部署和管理多个代理程序,从而降低了总体拥有成本。 展开更多
关键词 security check Point 产品 网络访问控制 安全解决方案 总体拥有成本 个人电脑
在线阅读 下载PDF
Check Point Endpoint Security正式上市
14
《电信技术》 2008年第10期58-58,共1页
互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间... 互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、全盘加密以及带有端口保护功能的媒介加密功能。这款称为Check Point Endpoint Security R70的方案为企业提供功能更强、更为精简的操作界面以及额外的工具。 展开更多
关键词 security check Point 上市 安全解决方案 网络访问控制 加密功能 反间谍软件
在线阅读 下载PDF
Check Point Endpoint Security正式上市
15
《中国电信业》 2008年第10期87-87,共1页
全球首屈一指的互联网安全解决方案供应商Check Point软件技术有限公司宣布,其Check Point End Doint Security最新版本正式上市,这是首款单一代理程序的端点安全解决方案,它结合了最高安全级别的防火墙、网络访问控制、程序控制、... 全球首屈一指的互联网安全解决方案供应商Check Point软件技术有限公司宣布,其Check Point End Doint Security最新版本正式上市,这是首款单一代理程序的端点安全解决方案,它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、 展开更多
关键词 security check Point 上市 安全解决方案 网络访问控制 反间谍软件 软件技术
在线阅读 下载PDF
Intrusion Detection Algorithm Based on Model Checking Interval Temporal Logic 被引量:5
16
作者 朱维军 王忠勇 张海宾 《China Communications》 SCIE CSCD 2011年第3期66-72,共7页
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ... Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks. 展开更多
关键词 network security intrusion detection misuse detection interval temporal logic model checking
在线阅读 下载PDF
Strategic Analysis on Objectives of National Grain Security
17
作者 Hong YANG 《Asian Agricultural Research》 2015年第7期85-88,共4页
Price of global agricultural products rises with great fluctuation. China's food price also increases constantly. This leads to high concern of both at home and abroad for food and grain security. On the basis of ... Price of global agricultural products rises with great fluctuation. China's food price also increases constantly. This leads to high concern of both at home and abroad for food and grain security. On the basis of making an overall analysis on current situation of grain security and making judgment on future grain security in China,this paper analyzed objectives,strategies and policies of national grain security in the new period. Finally,it came up with strategies and policy recommendations for improving agricultural production and guaranteeing national grain security. 展开更多
关键词 GRAIN security MEDIUM and long-term prediction STR
在线阅读 下载PDF
Research and Discussion on Big Data Operation and Maintenance Platform of Railway Passenger Security Inspection System
18
作者 CHENSiyu 《外文科技期刊数据库(文摘版)工程技术》 2022年第5期171-176,共6页
Railway passenger safety inspection is an important part of the anti-explosion safety line, and is the key to ensure the safety of railway transportation and the safety of passengers' lives and property. In order ... Railway passenger safety inspection is an important part of the anti-explosion safety line, and is the key to ensure the safety of railway transportation and the safety of passengers' lives and property. In order to effectively prevent dangerous goods from entering the station and getting on the bus, and to ensure the safe travel of passengers, this paper designs how to manage the railway security inspection system more efficiently and comprehensively, and constructs an intelligent security inspection operation and maintenance platform. The platform uses "CMDB" as the database for "supervision, management and control" integrated operation and maintenance management "to realize a unified asset allocation management library for security check equipment, integration and sharing of security check information, standardized process management of security check work, real-time status monitoring, environmental monitoring, intelligent contraband identification, fault prediction and other functions of security check equipment operation, which improves the overall intelligence level of security check equipment management, is beneficial to detecting the safety risks of station operation, improving the security check work efficiency, and ensuring the smooth and efficient operation of security check work. 展开更多
关键词 security check equipment operation and maintenance platform intelligent identification of contraba
原文传递
基于SPIN的Andrew Secure RPC协议并行攻击模型检测 被引量:2
19
作者 肖美华 朱科 马成林 《计算机科学》 CSCD 北大核心 2015年第7期103-107,共5页
Andrew Secure RPC协议具有身份认证和秘钥交换功能,其因简洁明了而被广泛应用于对称密钥加密体系中。模型检测技术具有高度自动化的优点,在协议安全性验证领域得到广泛应用,但模型检测方法只能检测到一轮协议会话中存在的攻击,难以检... Andrew Secure RPC协议具有身份认证和秘钥交换功能,其因简洁明了而被广泛应用于对称密钥加密体系中。模型检测技术具有高度自动化的优点,在协议安全性验证领域得到广泛应用,但模型检测方法只能检测到一轮协议会话中存在的攻击,难以检测到多轮并行会话中存在的并行攻击。针对Andrew Secure RPC协议运行环境中存在的并行性与可能出现的安全隐患,提出了组合身份建模方法。该方法运用著名的SPIN模型检测工具,对Andrew Secure RPC协议进行模型检测,从而得到攻击序列图,成功发现并行反射攻击和类缺陷攻击。上述组合身份建模方法为复杂环境下协议的模型检测提供了新的方向。 展开更多
关键词 ANDREW securE RPC协议 模型检测 SPIN 组合身份建模 并行攻击
在线阅读 下载PDF
Andrew Secure RPC协议的一种组合分析方法 被引量:1
20
作者 刘跃军 王红旗 杨强 《四川理工学院学报(自然科学版)》 CAS 2008年第4期43-46,共4页
逻辑方法和模型检验方法是安全协议的两种重要分析方法。逻辑方法简单、直观,但其最大问题是不够完备,模型检验方法自动化程度高且能生成不满足所需求性质的反例。先用BAN逻辑对Andrew Secure RPC协议进行分析,并在此基础上组合模型检... 逻辑方法和模型检验方法是安全协议的两种重要分析方法。逻辑方法简单、直观,但其最大问题是不够完备,模型检验方法自动化程度高且能生成不满足所需求性质的反例。先用BAN逻辑对Andrew Secure RPC协议进行分析,并在此基础上组合模型检验方法进行分析,结果表明逻辑方法组合模型检验方法分析协议比只用逻辑方法分析得到的结果更全面且更具体。 展开更多
关键词 逻辑方法 模型检验方法 组合方法 ANDREW securE RPC协议
在线阅读 下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部