Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a pu...Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.展开更多
In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into o...In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.展开更多
In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a ...In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development.展开更多
在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低...在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低的拥有总成本(TCO)。展开更多
本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推...本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推出即受到业界广泛关注。展开更多
Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功...Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功能的全方位端点安全解决方案。这款解决方案为个人电脑提供卓越的安全保护,而且无需部署和管理多个代理程序,从而降低了总体拥有成本。展开更多
互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间...互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、全盘加密以及带有端口保护功能的媒介加密功能。这款称为Check Point Endpoint Security R70的方案为企业提供功能更强、更为精简的操作界面以及额外的工具。展开更多
全球首屈一指的互联网安全解决方案供应商Check Point软件技术有限公司宣布,其Check Point End Doint Security最新版本正式上市,这是首款单一代理程序的端点安全解决方案,它结合了最高安全级别的防火墙、网络访问控制、程序控制、...全球首屈一指的互联网安全解决方案供应商Check Point软件技术有限公司宣布,其Check Point End Doint Security最新版本正式上市,这是首款单一代理程序的端点安全解决方案,它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、展开更多
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ...Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks.展开更多
Price of global agricultural products rises with great fluctuation. China's food price also increases constantly. This leads to high concern of both at home and abroad for food and grain security. On the basis of ...Price of global agricultural products rises with great fluctuation. China's food price also increases constantly. This leads to high concern of both at home and abroad for food and grain security. On the basis of making an overall analysis on current situation of grain security and making judgment on future grain security in China,this paper analyzed objectives,strategies and policies of national grain security in the new period. Finally,it came up with strategies and policy recommendations for improving agricultural production and guaranteeing national grain security.展开更多
Railway passenger safety inspection is an important part of the anti-explosion safety line, and is the key to ensure the safety of railway transportation and the safety of passengers' lives and property. In order ...Railway passenger safety inspection is an important part of the anti-explosion safety line, and is the key to ensure the safety of railway transportation and the safety of passengers' lives and property. In order to effectively prevent dangerous goods from entering the station and getting on the bus, and to ensure the safe travel of passengers, this paper designs how to manage the railway security inspection system more efficiently and comprehensively, and constructs an intelligent security inspection operation and maintenance platform. The platform uses "CMDB" as the database for "supervision, management and control" integrated operation and maintenance management "to realize a unified asset allocation management library for security check equipment, integration and sharing of security check information, standardized process management of security check work, real-time status monitoring, environmental monitoring, intelligent contraband identification, fault prediction and other functions of security check equipment operation, which improves the overall intelligence level of security check equipment management, is beneficial to detecting the safety risks of station operation, improving the security check work efficiency, and ensuring the smooth and efficient operation of security check work.展开更多
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)the National Natural Science Foundation of China(51378350)
文摘Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.
文摘In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source.
文摘In the process of urbanization,farmers will inevitably lose their land,which is resulted from the large-scale requisition of rural collective land.The imperfect social security system in rural areas has resulted in a large number of landless farmers being transformed into urban poor people.Therefore,proper resettlement of landless farmers and the establishment of a long-term security mechanism for ensuring the basic livelihood of landless farmers are important issues that need to be resolved in the process of China’s social and economic development.
文摘在互联网安全领域首屈一指的Check Point软件技术有限公司宣布推出UTM-1 Total Security系列的两款最新型号1070及2070,为客户提供更适合安全及性能要求的方案选择。UTM-1 Total Security设备能使企业享有全面的网络安全保护以及最低的拥有总成本(TCO)。
文摘本刊讯 11月2日,i-Security联合Check Point以及双方的代理商——盛港科技共同宣布,i-Security硬件平台通过了Check Point Opensec认证,成为Check Point SSL软件产品Connectra的硬件平台。i—Security Connectra网关安全产品一经推出即受到业界广泛关注。
文摘Check Point最近推出Check Point Endpoint Security产品就能帮助用户为个人电脑装上稳固的“防盗门”,它是市场上第一款,也是惟一一款结合了最高安全级别防火墙、网络访问控制、程序控制、防病毒、反间谍软件、数据安全和远程访问功能的全方位端点安全解决方案。这款解决方案为个人电脑提供卓越的安全保护,而且无需部署和管理多个代理程序,从而降低了总体拥有成本。
文摘互联网安全解决方案供应商Check Point软件技术有限公司的Check Point Endpoint Security最新版本正式上市,这是一款单一代理程序的端点安全解决方案。它结合了最高安全级别的防火墙、网络访问控制、程序控制、远程访问、防病毒、反间谍软件、全盘加密以及带有端口保护功能的媒介加密功能。这款称为Check Point Endpoint Security R70的方案为企业提供功能更强、更为精简的操作界面以及额外的工具。
基金supported by National Natural Science Foundation of China under Grant No. 61003079
文摘Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks.
文摘Price of global agricultural products rises with great fluctuation. China's food price also increases constantly. This leads to high concern of both at home and abroad for food and grain security. On the basis of making an overall analysis on current situation of grain security and making judgment on future grain security in China,this paper analyzed objectives,strategies and policies of national grain security in the new period. Finally,it came up with strategies and policy recommendations for improving agricultural production and guaranteeing national grain security.
文摘Railway passenger safety inspection is an important part of the anti-explosion safety line, and is the key to ensure the safety of railway transportation and the safety of passengers' lives and property. In order to effectively prevent dangerous goods from entering the station and getting on the bus, and to ensure the safe travel of passengers, this paper designs how to manage the railway security inspection system more efficiently and comprehensively, and constructs an intelligent security inspection operation and maintenance platform. The platform uses "CMDB" as the database for "supervision, management and control" integrated operation and maintenance management "to realize a unified asset allocation management library for security check equipment, integration and sharing of security check information, standardized process management of security check work, real-time status monitoring, environmental monitoring, intelligent contraband identification, fault prediction and other functions of security check equipment operation, which improves the overall intelligence level of security check equipment management, is beneficial to detecting the safety risks of station operation, improving the security check work efficiency, and ensuring the smooth and efficient operation of security check work.