期刊文献+
共找到449篇文章
< 1 2 23 >
每页显示 20 50 100
BC-BLPM:A Multi-Level Security Access Control Model Based on Blockchain Technology 被引量:4
1
作者 Xiang Yu Zhangxiang Shu +1 位作者 Qiang Li Jun Huang 《China Communications》 SCIE CSCD 2021年第2期110-135,共26页
Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchai... Traditional multi-level security(MLS)systems have the defect of centralizing authorized facilities,which is difficult to meet the security requirements of modern distributed peer-to-peer network architecture.Blockchain is widely used in the field of access control with its decentralization,traceability and non-defective modification.Combining the blockchain technology and the Bell-LaPadula model,we propose a new access control model,named BCBLPM,for MLS environment.The“multi-chain”blockchain architecture is used for dividing resources into isolated access domains,providing a fine-grained data protection mechanism.The access control policies are implemented by smart contracts deployed in each access domain,so that the side chains of different access domains storage access records from outside and maintain the integrity of the records.Finally,we implement the BC-BLPM prototype system using the Hyperledger Fabric.The experimental and analytical results show that the model can adapt well to the needs of multi-level security environment,and it has the feasibility of application in actual scenarios. 展开更多
关键词 multi-level security(MLS) access control blockchain multi-chain smart contract
在线阅读 下载PDF
A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I:Theory 被引量:1
2
作者 LIU Qian WANG Guanhai +2 位作者 WENG Chuliang LUO Yuan LI Minglu 《China Communications》 SCIE CSCD 2010年第4期137-143,共7页
At present,there are few security models which control the communication between virtual machines(VMs).Moreover,these models are not applicable to multi-level security(MLS).In order to implement mandatory access contr... At present,there are few security models which control the communication between virtual machines(VMs).Moreover,these models are not applicable to multi-level security(MLS).In order to implement mandatory access control(MAC)and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control(DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation. 展开更多
关键词 Virtual Machine System Mandatory access control multi-level security Virt-BLP
在线阅读 下载PDF
Multi-level access control model for tree-like hierarchical organizations
3
作者 於光灿 李瑞轩 +3 位作者 卢正鼎 Mudar Sarem 宋伟 苏永红 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期393-396,共4页
An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning secur... An access control model is proposed based on the famous Bell-LaPadula (BLP) model.In the proposed model,hierarchical relationships among departments are built,a new concept named post is proposed,and assigning security tags to subjects and objects is greatly simplified.The interoperation among different departments is implemented through assigning multiple security tags to one post, and the more departments are closed on the organization tree,the more secret objects can be exchanged by the staff of the departments.The access control matrices of the department,post and staff are defined.By using the three access control matrices,a multi granularity and flexible discretionary access control policy is implemented.The outstanding merit of the BLP model is inherited,and the new model can guarantee that all the information flow is under control.Finally,our study shows that compared to the BLP model,the proposed model is more flexible. 展开更多
关键词 multi-level access control hierarchical organization multiple security tags
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
4
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
Security Service Technology for Mobile Networks
5
作者 Aiqun Hu Tao Li Mingfu Xue 《ZTE Communications》 2011年第3期49-54,共6页
As mobile networks become high speed and attain an all-IP structure,more services are possible.This brings about many new security requirements that traditional security programs cannot handle.This paper analyzes secu... As mobile networks become high speed and attain an all-IP structure,more services are possible.This brings about many new security requirements that traditional security programs cannot handle.This paper analyzes security threats and the needs of 3G/4G mobile networks,and then proposes a novel protection scheme for them based on their whole structure.In this scheme,a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control.At the security management center,security services such as validity verification and integrity check are provided to mobile terminals.In this way,terminals and the network as a whole are secured to a much greater extent.This paper also highlights problems to be addressed in future research and development. 展开更多
关键词 mobile network security security service trusted computing access control
在线阅读 下载PDF
Towards Effective Integrated Access Control Lists in Internet Networks
6
作者 Kamal A. Ahmat Ammar Elnour 《通讯和计算机(中英文版)》 2013年第10期1284-1291,共8页
关键词 访问控制列表 INTERNET网络 有效集成 启发式算法 企业网络 安全漏洞 网络性能 ACL
在线阅读 下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
7
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
在线阅读 下载PDF
DPZTN:Data-Plane-Based Access Control Zero-Trust Network
8
作者 Jingfu Yan Huachun Zhou Weilin Wang 《Computer Systems Science & Engineering》 2025年第1期499-531,共33页
The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust netw... The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust networks)have demonstrated significant advancements in constructing trust-centric frameworks,most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities.Furthermore,current ZTN designs generally do not facilitate dynamic assessment of user reputation.To address these limitations,this study proposes a DPZTN(Data-plane-based Zero Trust Network).DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane.Additionally,blockchain infrastructure is used to enable decentralized identity authentication and distributed access control.A pivotal element within the proposed framework is ZTNE(Zero-Trust Network Element),which executes access control policies and performs real-time user traffic inspection.To enable dynamic and fine-grained evaluation of user trustworthiness,this study introduces BBEA(Bayesian-based Behavior Evaluation Algorithm).BBEA provides a framework for continuous user behavior analysis,supporting adaptive privilege management and behavior-informed access control.Experimental results demonstrate that ZTNE combined with BBEA,can effectively respond to both individual and mixed attack types by promptly adjusting user behavior scores and dynamically modifying access privileges based on initial privilege levels.Under conditions supporting up to 10,000 concurrent users,the control system maintains approximately 65%CPU usage and less than 60%memory usage,with average user authentication latency around 1 s and access control latency close to 1 s. 展开更多
关键词 Zero trust network data plane bayesian-based behavior evaluation blockchain-based access control security functions
在线阅读 下载PDF
人工智能安全访问控制系统设计
9
作者 雷蕾 《计算机应用文摘》 2026年第2期107-109,共3页
针对内网安全面临的威胁,文章设计了一种基于人工智能的安全访问控制系统。首先,从架构层面分析该系统结构,涵盖网络层、接口层与系统层;硬件部分由数据处理设备、主服务器集群、入侵检测防御设备及网络设备组成,协同实现对威胁行为的... 针对内网安全面临的威胁,文章设计了一种基于人工智能的安全访问控制系统。首先,从架构层面分析该系统结构,涵盖网络层、接口层与系统层;硬件部分由数据处理设备、主服务器集群、入侵检测防御设备及网络设备组成,协同实现对威胁行为的实时监测与防护。软件方面,系统采用基于模糊聚类的人工智能克隆算法,以有效检测访问控制系统中的异常行为与潜在风险;通过客户端模块响应用户数据请求,并集成授权区块链技术实现安全日志存储,增强访问过程的可靠性与可追溯性。测试结果表明,该系统在实际运行中具有较高的安全性,可有效提升访问控制环节的防护能力。 展开更多
关键词 局域网 人工智能 安全访问 控制系统
在线阅读 下载PDF
基于零信任架构的网络安全防御系统的设计与实现
10
作者 杜奕霖 罗海涛 +2 位作者 黄炜 王伟奇 黄华豪 《移动信息》 2026年第2期82-84,共3页
随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零... 随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零信任架构的网络安全防御系统。在系统实现部分,引入基于动态信任评分模型、策略自适应调整模型以及风险—收益优化模型,使系统能够在复杂网络环境下实现“持续验证—动态调节—平衡取舍”的完整防御逻辑。最后,以某高校校园网为案例进行了测试。结果表明,该系统在降低入侵风险,提升访问安全性方面具有良好效果,为高校及其他组织的网络安全建设提供了参考。 展开更多
关键词 零信任架构 网络安全 身份认证 访问控制 高校网络
在线阅读 下载PDF
变电站综合自动化系统通信安全防护技术研究
11
作者 张琦玮 闫绍华 谷芊锐 《通信电源技术》 2026年第1期174-176,共3页
变电站综合自动化系统由过程层、间隔层及站控层组成,负责采样、控制及调度通信。分析通信安全威胁场景与风险,研究面向通用对象的变电站事件(Generic Object Oriented Substation Event,GOOSE)、采样值(Sampled Value,SV)及IEC104在实... 变电站综合自动化系统由过程层、间隔层及站控层组成,负责采样、控制及调度通信。分析通信安全威胁场景与风险,研究面向通用对象的变电站事件(Generic Object Oriented Substation Event,GOOSE)、采样值(Sampled Value,SV)及IEC104在实时场景下的伪报文、重放及时序扰动风险,构建网络分区与访问控制、协议与身份安全加固、入侵检测与审计联动的防护体系,形成白名单、报文完整性校验、链路加密及深度包检测异常识别的协同机制,旨在支撑实时控制链稳定运行并实现工程级安全落地。 展开更多
关键词 变电站综合自动化 通信安全防护 网络隔离与访问控制
在线阅读 下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
12
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data security Authentication access control In-network data sharing Information-centric network
在线阅读 下载PDF
基于深度学习的广域网教育信息安全访问自动化控制系统设计 被引量:2
13
作者 宁梓淯 李萌 +2 位作者 李燕 高宇 任重贵 《电子设计工程》 2025年第6期100-103,108,共5页
为了提升教育信息安全,设计基于深度学习的广域网教育信息安全访问自动化控制系统。利用级联多任务卷积神经网络,判定用户身份与用户访问行为是否安全,依据深度学习引擎输出结果,确定用户访问行为的信任值,监督管理用户的身份安全。判... 为了提升教育信息安全,设计基于深度学习的广域网教育信息安全访问自动化控制系统。利用级联多任务卷积神经网络,判定用户身份与用户访问行为是否安全,依据深度学习引擎输出结果,确定用户访问行为的信任值,监督管理用户的身份安全。判定访问控制引擎对用户访问行为的权限鉴定结果,用户未通过权限鉴定时,自动拒绝用户访问请求,断开用户终端的访问请求;用户通过权限鉴定时,将用户访问转移至所需的教育信息资源,实现教育信息访问的自动化控制。测试结果表明,该系统可以精准判定用户的非法访问、异常登录、越权访问等行为,自动中断用户与教育信息的连接。 展开更多
关键词 深度学习 广域网 教育信息 安全访问 自动化 控制系统
在线阅读 下载PDF
基于零信任的网络安全模型架构及其应用 被引量:1
14
作者 王长杰 《清远职业技术学院学报》 2025年第4期68-75,共8页
由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为... 由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为中心的安全保护模式,使访问行为更加安全可信。本文在对传统网络架构及安全隐患介绍的基础上,阐述零信任网络安全架构技术和核心思想,设计出包括控制层面、数据层面、访问主体、访问客体四部分的零信任网络安全应用模型总体架构,并提出在远程移动办公和云计算应用场景中的可行性解决方案,确保网络中各类资源能够可信可控地被访问。 展开更多
关键词 零信任 身份认证 动态访问控制 网络安全模型
在线阅读 下载PDF
基于贝叶斯网络的深海浮式设施数据中心访问安全控制方法
15
作者 刘昊 邓欣 +1 位作者 于超 王鑫章 《天津科技》 2025年第4期4-7,共4页
传统石油企业一体化管理平台数据访问安全控制的范围有限,在“深海一号”等项目的开发及应用过程中,现场数据中心中用户和数据之间复杂交互,致使拓扑率变低,不利于平台的安全运行。通过引入贝叶斯网络模型,提出一种全新的控制方法,以评... 传统石油企业一体化管理平台数据访问安全控制的范围有限,在“深海一号”等项目的开发及应用过程中,现场数据中心中用户和数据之间复杂交互,致使拓扑率变低,不利于平台的安全运行。通过引入贝叶斯网络模型,提出一种全新的控制方法,以评估访问的用户行为信任度、对石油企业一体化管理平台数据进行访问分级、设置石油企业一体化管理平台数据访问的安全控制权限,从而实现石油企业一体化管理平台数据访问的安全控制。对比实验证明,该方法的拓扑率较高,可有效保证数据安全,优势显著。 展开更多
关键词 贝叶斯网络 石油企业 一体化管理 平台数据访问 安全控制
在线阅读 下载PDF
抗属性篡改的信息化监控网络调取数据安全共享方法
16
作者 吕文官 薛峰 《常州工学院学报》 2025年第1期26-30,50,共6页
在信息化监控网络数据调取和共享过程中,数据的完整性容易受到篡改或损坏。恶意的攻击者可能对数据进行修改或删除,从而影响数据的准确性和可信度。为此,提出了抗属性篡改的信息化监控网络调取数据安全共享方法。利用局部敏感哈希相似... 在信息化监控网络数据调取和共享过程中,数据的完整性容易受到篡改或损坏。恶意的攻击者可能对数据进行修改或删除,从而影响数据的准确性和可信度。为此,提出了抗属性篡改的信息化监控网络调取数据安全共享方法。利用局部敏感哈希相似性搜索方法,提取信息化监控网络的数据特征。基于联盟区块链和外包解密技术,创建了去中心化的框架,用于安全共享加密数据,基于抗属性篡改,搭建访问控制合约框架,实现对抗属性篡改的信息化监控网络调取数据安全共享。实验结果表明,所提方法的用户属性私钥生成时间最短为315 ms,受攻击后加密时间较短,最低为3.79 s,当实验次数为10次时,所提方法的数据共享时的安全性系数约为0.92,可以防止恶意攻击者篡改用户属性或获取未被授权的属性。 展开更多
关键词 抗属性篡改 信息化 监控网络 调取数据 安全共享 访问控制合约
在线阅读 下载PDF
基于零信任架构的高职院校校园网安全访问控制方法
17
作者 张超 《电脑与信息技术》 2025年第4期56-59,101,共5页
校园网的直接映射方式导致暴露的端口增多,且用户的身份状态是动态变化的,这增加了访问攻击的途径和校园网的风险值。为此,提出基于零信任架构的高职院校校园网安全访问控制方法。首先,根据零信任架构的设计理念,将校园网业务纳入统一管... 校园网的直接映射方式导致暴露的端口增多,且用户的身份状态是动态变化的,这增加了访问攻击的途径和校园网的风险值。为此,提出基于零信任架构的高职院校校园网安全访问控制方法。首先,根据零信任架构的设计理念,将校园网业务纳入统一管理,减少直接暴露在公网的业务系统数量,并通过构建用户身份认证机制,实现对用户身份的严格验证和动态管理。然后,根据用户的身份、职务和访问需求,评估校园网访问权限并做出动态调整,结合细粒度的权限管控策略,确保用户只能访问其权限范围内的资源。最后,执行校园网多层次安全访问控制,保证网络运行安全。实验结果表明,应用该方法后,校园网访问安全评估值介于0.90和0.98之间,说明该方法使校园网的安全性得到了显著提升。 展开更多
关键词 零信任架构 校园网 安全访问控制 用户身份
在线阅读 下载PDF
零信任视角下档案数据安全治理:风险因素、基本模型和行动路向 被引量:5
18
作者 朱明龙 于海燕 《档案管理》 北大核心 2025年第2期44-48,共5页
作为一种安全理念,零信任基于“永不信任、始终验证”的原则,使得数据治理具备足够的安全弹性和自适应能力,为档案数据安全治理提供创新思路。当前档案数据面临网络安全防御物理边界薄弱、档案数据访问场景复杂、档案数据流通监管缺乏... 作为一种安全理念,零信任基于“永不信任、始终验证”的原则,使得数据治理具备足够的安全弹性和自适应能力,为档案数据安全治理提供创新思路。当前档案数据面临网络安全防御物理边界薄弱、档案数据访问场景复杂、档案数据流通监管缺乏等风险因素。通过在档案数据安全治理中引入零信任理念,在对核心概念和基本模型阐释的基础上,从数据层、控制层、用户层构建零信任视角下档案数据安全治理的基本模型,进而档案部门可在交流协作中深化理解,采取多种认证方式,强化访问控制,并通过开展信任评估,对档案数据开展安全检测,进一步提高我国档案数据安全治理效能。 展开更多
关键词 零信任 档案数据 数据安全 安全理念 安全治理 网络安全 访问控制 信任评估
在线阅读 下载PDF
基于CP-ABE算法的移动网络数据访问安全控制方法
19
作者 唐华 张磊 《计算机仿真》 2025年第12期377-380,390,共5页
移动网络安全保护中,数据加密通常仅针对原始数据内容,未将权限相关的属性与数据加密过程深度融合,使得访问者能够绕过正常的权限验证机制获取不当的数据访问权限。针对上述问题,为了提升移动网络数据的安全性,提出一种基于密文策略-属... 移动网络安全保护中,数据加密通常仅针对原始数据内容,未将权限相关的属性与数据加密过程深度融合,使得访问者能够绕过正常的权限验证机制获取不当的数据访问权限。针对上述问题,为了提升移动网络数据的安全性,提出一种基于密文策略-属性基加密(Ciphertext-Policy Attribute-Based Encryption,CP-ABE)算法的移动网络数据访问安全控制方法。首先,通过节点管理器建立移动网络在线节点列表,将其发送给源节点,利用源节点利获取数据传输路径;其次,初步加密处理移动网络数据,并将密文沿着路径上传至服务器;最后,为了进一步增加数据的安全性,利用CP-ABE加密算法,融合数据加密与权限认证过程,根据预设的密文策略和用户属性来分析用户的身份。只有当用户属性完全符合密文所规定的访问权限结构时,用户才能够解密密文内容,以此来实现对移动网络数据访问过程的安全控制。仿真结果表明:所提方法能够实现精确的访问控制,有效提升移动网络数据的安全性。 展开更多
关键词 密文策略-属性基加密算法 移动网络数据 访问安全控制 数据加密 访问权限
在线阅读 下载PDF
大数据时代下计算机网络安全技术的挑战与对策研究 被引量:5
20
作者 赵金金 孙正伟 《软件》 2025年第1期178-180,共3页
随着大数据时代的到来,计算机网络技术得到了广泛应用,但与此同时,网络安全问题也日益凸显。本文探讨了大数据时代下计算机网络安全技术所面临的挑战,包括数据泄露、恶意攻击、隐私保护等。通过对这些挑战的分析,提出了相应的对策,如加... 随着大数据时代的到来,计算机网络技术得到了广泛应用,但与此同时,网络安全问题也日益凸显。本文探讨了大数据时代下计算机网络安全技术所面临的挑战,包括数据泄露、恶意攻击、隐私保护等。通过对这些挑战的分析,提出了相应的对策,如加强加密技术、完善访问控制、建立安全监测体系等,以提高计算机网络的安全性,保护用户的信息和数据安全。 展开更多
关键词 大数据时代 计算机网络安全 挑战 对策 数据泄露 加密技术 访问控制 安全监测
在线阅读 下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部