期刊文献+
共找到37篇文章
< 1 2 >
每页显示 20 50 100
Exploring the Nuclear Power DCS Network Security Management Method and Its Application
1
作者 Yu Chen Yongjie Fu Yajie Wen 《Journal of Electronic Research and Application》 2025年第3期97-103,共7页
Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall c... Given the grave local and international network security landscape,a national strategic level analysis indicates that the modernization and advancement within the Industry 4.0 era are closely correlated with overall competitive strength.Consequently,China proposed a strategy for the integration of industrialization and informatization,optimizing and adjusting its industrial structure to swiftly achieve transformation and upgrading in the Industry 4.0 era,thereby enhancing the sophistication of intelligent industrial control systems.The distributed control system in a nuclear power plant functions as an industrial control system,overseeing the operational status of the physical process.Its ability to ensure safe and reliable operation is directly linked to nuclear safety and the cybersecurity of the facility.The management of network security in distributed control systems(DCS)is crucial for achieving this objective.Due to the varying network settings and parameters of the DCS implemented in each nuclear power plant,the network security status of the system sometimes diverges from expectations.During system operation,it will undoubtedly encounter network security issues.Consequently,nuclear power plants utilize the technical criteria outlined in GB/T 22239 to formulate a network security management program aimed at enhancing the operational security of DCS within these facilities.This study utilizes existing network security regulations and standards as a reference to analyze the network security control standards based on the nuclear power plant’s control system.It delineates the fundamental requirements for network security management,facilitating integration with the entire life cycle of the research,development,and application of the nuclear power plant’s distributed control system,thereby establishing a network security management methodology that satisfies the control requirements of the nuclear power plant.Initially,it presents DCS and network security management,outlines current domestic and international network security legislation and standards,and specifies the standards pertinent to the administration of DCS in nuclear power plants.Secondly,the design of network security management for DCS is executed in conjunction with the specific context of nuclear power plants.This encompasses the deployment of network security apparatus,validation of the network security management strategy,and optimization adjustments.Consequently,recommendations beneficial to the network security management of nuclear power plants are compiled,aimed at establishing a management system and incorporating the concept of full life cycle management,which is predicated on system requirements,system design,and both software and hardware considerations.Conversely,it presents the notion of comprehensive life cycle management and suggests network security management strategies encompassing system requirements,system architecture,detailed hardware and software design and implementation,procurement,internal system integration,system validation and acceptance testing,system installation,operational maintenance,system modifications,and decommissioning.We will consistently enhance the performance and functionality of DCS in nuclear power plants,establish a safe and secure operational environment,and thereby facilitate the implementation of DCS in nuclear facilities while ensuring robust network security in the future. 展开更多
关键词 Network security DCS Nuclear power plant Network security management
在线阅读 下载PDF
Dynamic Data Classification Strategy and Security Management in Higher Education: A Case Study of Wenzhou Medical University
2
作者 Chunyan Yang Feng Chen Jiahao He 《教育技术与创新》 2025年第1期1-10,共10页
In the context of the rapid development of digital education,the security of educational data has become an increasing concern.This paper explores strategies for the classification and grading of educational data,and ... In the context of the rapid development of digital education,the security of educational data has become an increasing concern.This paper explores strategies for the classification and grading of educational data,and constructs a higher educational data security management and control model centered on the integration of medical and educational data.By implementing a multi-dimensional strategy of dynamic classification,real-time authorization,and secure execution through educational data security levels,dynamic access control is applied to effectively enhance the security and controllability of educational data,providing a secure foundation for data sharing and openness. 展开更多
关键词 data classification strategy dynamic classification data security management
在线阅读 下载PDF
Status and prospect of security management of marine data storage
3
作者 WU Yongfang CAI Renhan +2 位作者 ZHANG Xueling SI Jia WANG Xiaorui 《Marine Science Bulletin》 2024年第1期57-66,共10页
China's marine data includes marine hydrology,marine meteorology,marine biology,marine chemistry,marine substrate,marine geophysical,seabed topography and other categories of data,the total amount of data reaches ... China's marine data includes marine hydrology,marine meteorology,marine biology,marine chemistry,marine substrate,marine geophysical,seabed topography and other categories of data,the total amount of data reaches the magnitude of PB,and the amount of data is still increasing.The safe management of these marine data storage is the basis of building a Smart Ocean.This paper discusses the current situation of security management of marine data storage in China,analyzes the problems of security management in domestic marine data storage,and puts forward suggestions. 展开更多
关键词 intelligent ocean DATA STORAGE security management
在线阅读 下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
4
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
在线阅读 下载PDF
Application of the PKPM-BIM construction management platform in project security management 被引量:2
5
作者 Liu Chen Wang Jing 《Computer Aided Drafting,Design and Manufacturing》 2017年第1期58-62,共5页
This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contr... This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction. 展开更多
关键词 PKPM-BIM construction management platform security management BIM technology CONSTRUCTION CONTRACTOR
在线阅读 下载PDF
Technical Analysis of Security Management in Terms of Crowd Energy and Smart Living
6
作者 MD Shahrukh Adnan Khan Muhammad Ahad Rahman Miah +4 位作者 Shaikh Rashedur Rahman Mirza Mursalin Iqbal Aseef Iqbal Aravind CV Chua Kein Huat 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第4期367-378,共12页
In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept an... In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept and next generation smart living. Various case examples have been studied and a brief summary has been provided.Furthermore, a statistical analysis has been provided in terms of security management in smart living where it is found that young technocrats give the highest importance to security management in smart living. Last but not the least, current limitation, constraints, and future scope of security implementation have been discussed in terms of crowd energy clustered with next generation smart living. 展开更多
关键词 Crowd energy security management smart living statistical analysis
在线阅读 下载PDF
The Role of Information Security Development (ISD) in Effective Information Security Management (ISM) Implementation in the Banks: A Nigerian Case
7
作者 Dorcas Adebola Babatunde Mohamad Hisyam Selamat Ramat Titilayo Salman 《Journal of Modern Accounting and Auditing》 2014年第5期614-619,共6页
This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, inform... This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in effective information security management (ISM) implementation in the banks (a Nigerian case). This paper explores the existing literature and a proposed framework that consists of ISD such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in ISM implementation. ISD factors are found to be statistically significant, because it motivates an organization to implement effective ISM in the banks. Hence, it could be said that the role of ISD practices in an effective implementation of ISM among banks in Nigeria will be of great value. 展开更多
关键词 information security management (ISM) information security plans perceived quality training programs organizational culture Nigeria
在线阅读 下载PDF
New capacity steadily commissioned, security management highly strengthened
8
《Electricity》 1998年第3期5-5,共1页
关键词 New capacity steadily commissioned security management highly strengthened
在线阅读 下载PDF
The Function and Influence of Social Security Management System
9
作者 WANGYedi 《外文科技期刊数据库(文摘版)经济管理》 2022年第1期211-214,共4页
In order to better safeguard the interests of the people and seek welfare for the people, our country pays more attention to the optimization of the social security system of the people. Therefore, our government has ... In order to better safeguard the interests of the people and seek welfare for the people, our country pays more attention to the optimization of the social security system of the people. Therefore, our government has invested more energy and financial resources in the social security management. The implementation of social security management is directly related to the welfare and interests of our citizens. Paying attention to the vital interests of citizens is very important to promote people's well-being and ensure the long-term stability of the country. While developing and building a socialist country, China's enterprises are facing huge market competition. In order to enhance the cohesion of the company and build a more harmonious corporate atmosphere, we need to continuously optimize the welfare benefits of the employees to ensure that they are guaranteed in order to lay a good foundation for the development of the enterprise and social progress. 展开更多
关键词 social civilization social security social security management market competition human resource
原文传递
Information Security Management Measures for College Archives Under the Network Environment
10
作者 Litao Cui 《Journal of Electronic Research and Application》 2022年第6期15-19,共5页
The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelera... The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelerated.Network technology is developing rapidly in our country,and the number of network users has increased significantly.The use of network technology in university archives management can improve the management efficiency and quality of archives,but the safety factor has dropped significantly.For example,the archival system may face many problems such as virus infection,system paralysis,or cyberattacks,which affects the security of the university archives.Therefore,this paper presents an analysis of these problems in detail,and proposes corresponding solutions,so as to optimize and improve the information security management of college archives. 展开更多
关键词 Network environment University archives Information security management
在线阅读 下载PDF
Research on the Application of Refined Management in Construction Industry Management
11
作者 Xuejun Ouyang 《Journal of Architectural Research and Development》 2025年第2期9-13,共5页
Refined management,as a management concept and method that pursues efficiency,quality,and low consumption,has been applied in various industries.Due to its particularity,the construction industry needs to strengthen m... Refined management,as a management concept and method that pursues efficiency,quality,and low consumption,has been applied in various industries.Due to its particularity,the construction industry needs to strengthen management and refined management has become the primary choice for the industry,which is of great significance for its stable development.The article elaborates on the definition of refined management,analyzes the necessity of refined management in the construction industry,and explores the application measures of refined management in construction industry management,aiming to provide reference for improving the management level of the construction industry. 展开更多
关键词 Refined management Construction industry Cost management security management
在线阅读 下载PDF
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach 被引量:2
12
作者 Joseph E. Mbowe Simon S. Msanjila +1 位作者 George S. Oreku Khamisi Kalegele 《Journal of Software Engineering and Applications》 2016年第12期601-623,共23页
The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define ... The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes. 展开更多
关键词 security Threats Analytic Threat Visualization security management Automated security Policies
在线阅读 下载PDF
New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions
13
作者 WANG Mingzheng WANG Yigjie +2 位作者 WAVG Tianyu HOU Linzao LI Mian 《Journal of Shanghai Jiaotong university(Science)》 EI 2020年第6期689-699,共11页
Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in ... Security evaluation and management has become increasingly important for Web-based information technology(IT)systems,especially for educational institutions.For the security evaluation and management of IT systems in educational institutions,determining the security level for a single IT system has been well developed.However,it is still dificult to evaluate the information security level of the entire educational institution consid-ering multiple IT systems,because there might be too many different IT systems in one institution,educational institutions can be very different,and there is no standard model or method to provide a just ifable information security evaluation among different educational inst itutions considering their differences.In light of these difi-culties,a security evaluation model of educational institutions'IT systems(SEMEIS)is proposed in this work to facilitate the information security management for the educat ional institutions.Firstly,a simplified educational industry information system security level protection rating(EIISSLPR)with a new weight redistribution strategy for a single IT systern is proposed by choosing important evaluation questions from EIISSLPR and redistributing the weights of these questions.Then for the entire educational institution,analytic hierarchy process(AHP)is used to redistribute the weights of multiple IT systems at different security levels.considering the risk of pos-sible network security vulnerabilities,a risk index is forulated by weighting different factors,normalized by a utility function,and calculated with the real data collected from the institutions under the evaluation.Finally,the information security performance of educational institutions is obtained as the final score from SEMEIS.The results show that SEMEIS can evaluate the security level of the educat ion institutions practically and provide an efficient and effective management tool for the information security management. 展开更多
关键词 information security management information technology(IT)systems analytic hierarchy process(AHP) educational institution
原文传递
The Blockchain Neural Network Superior to Deep Learning for Improving the Trust of Supply Chain
14
作者 Hsiao-Chun Han Der-Chen Huang 《Computer Modeling in Engineering & Sciences》 2025年第6期3921-3941,共21页
With the increasing importance of supply chain transparency,blockchain-based data has emerged as a valuable and verifiable source for analyzing procurement transaction risks.This study extends the mathematical model a... With the increasing importance of supply chain transparency,blockchain-based data has emerged as a valuable and verifiable source for analyzing procurement transaction risks.This study extends the mathematical model and proof of‘the Overall Performance Characteristics of the Supply Chain’to encompass multiple variables within blockchain data.Utilizing graph theory,the model is further developed into a single-layer neural network,which serves as the foundation for constructing two multi-layer deep learning neural network models,Feedforward Neural Network(abbreviated as FNN)and Deep Clustering Network(abbreviated as DCN).Furthermore,this study retrieves corporate data from the Chunghwa Yellow Pages online resource and Taiwan Economic Journal database(abbreviated as TEJ).These data are then virtualized using‘the Metaverse Algorithm’,and the selected virtualized blockchain variables are utilized to train a neural network model for classification.The results demonstrate that a single-layer neural network model,leveraging blockchain data and employing the Proof of Relation algorithm(abbreviated as PoR)as the activation function,effectively identifies anomalous enterprises,which constitute 7.2%of the total sample,aligning with expectations.In contrast,the multi-layer neural network models,DCN and FNN,classify an excessively large proportion of enterprises as anomalous(ranging from one-fourth to one-third),which deviates from expectations.This indicates that deep learning may still be inadequate in effectively capturing or identifying malicious corporate behaviors associated with distortions in procurement transaction data.In other words,procurement transaction blockchain data possesses intrinsic value that cannot be replaced by artificial intelligence(abbreviated as AI). 展开更多
关键词 Blockchain neural network deep learning consensus algorithm supply chain management information security management
在线阅读 下载PDF
A multi-layered policy generation and management engine for semantic policy mapping in clouds
15
作者 Faraz Fatemi Moghaddam Philipp Wieder Ramin Yahyapour 《Digital Communications and Networks》 SCIE 2020年第1期38-50,共13页
The long awaited cloud computing concept is a reality now due to the transformation of computer generations.However,security challenges have become the biggest obstacles for the advancement of this emerging technology... The long awaited cloud computing concept is a reality now due to the transformation of computer generations.However,security challenges have become the biggest obstacles for the advancement of this emerging technology.A well-established policy framework is defined in this paper to generate security policies which are compliant to requirements and capabilities.Moreover,a federated policy management schema is introduced based on the policy definition framework and a multi-level policy application to create and manage virtual clusters with identical or common security levels.The proposed model consists in the design of a well-established ontology according to security mechanisms,a procedure which classifies nodes with common policies into virtual clusters,a policy engine to enhance the process of mapping requests to a specific node as well as an associated cluster and matchmaker engine to eliminate inessential mapping processes.The suggested model has been evaluated according to performance and security parameters to prove the efficiency and reliability of this multilayered engine in cloud computing environments during policy definition,application and mapping procedures. 展开更多
关键词 Cloud computing security security management Policy management Access control Policy mapping
在线阅读 下载PDF
Closed-loop prevention and control research of coal mine safety management
16
作者 LI Xing-dong ZHAO Yun-xia +1 位作者 ZHAO Xing-qiang LU Ying 《Journal of Coal Science & Engineering(China)》 2009年第3期324-327,共4页
According to the current problems of safety management processes in coalmine enterprises,we introduced barrel theory to coal mine safety management,constructedthe closed-loop structure of a coal mine safety management... According to the current problems of safety management processes in coalmine enterprises,we introduced barrel theory to coal mine safety management,constructedthe closed-loop structure of a coal mine safety management system,andpointed out that efficient safety management lies in three factors:safety quality of all ofthe staff in coal mine enterprises,weak links in security management systems,and cooperationamong departments.After conducting detailed analysis of these three factors,we proposed concrete ways of preventing and controlling potential safety hazards duringthe process of coal mine production. 展开更多
关键词 closed-loop structure prevention and control security management wooden barrel theory
在线阅读 下载PDF
Information Security Service Support-Helping End-Users Cope with Security
17
作者 Rahul Rastogi Rossouw yon Solms 《Computer Technology and Application》 2011年第2期137-147,共11页
Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated infor... Organizations implement an information security program for the protection of their information assets. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls. These policies and controls depend directly upon the resultant behavior and actions of end-users. Hence, end-users play a critical role in the effective implementation and running of an information security program in any organization. However, end-users are often unable to navigate and comprehend the various policies, controls and associated issues. Support to end-users is therefore a vital element, but is often neglected by present information security management systems. In the service industry, support to customers is established as an important determinant of customer perceived service quality. This paper applies the same philosophy to provide support to end-users, who are the customers of the Information Security Service. 展开更多
关键词 Information security management information security service management (ISSM) service management informationsecurity service support (ISSS) service encounter.
在线阅读 下载PDF
Research on Heterogeneous Network Security Devices
18
作者 Yishui Lin Tingting Yu 《International Journal of Technology Management》 2013年第3期23-27,共5页
With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to de... With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices. 展开更多
关键词 heterogeneous networks security management security equipment
在线阅读 下载PDF
Safety Management and Implementation of Construction of Additional Multi-span Passenger Flyover at High-speed Railway Operation Stations
19
作者 GONGWenlin LIChen 《外文科技期刊数据库(文摘版)工程技术》 2022年第4期213-219,共7页
With the rapid development of socialist modern economy, the construction of railway transportation facilities in China is also improving. At present, China's railway construction is mostly the construction of long... With the rapid development of socialist modern economy, the construction of railway transportation facilities in China is also improving. At present, China's railway construction is mostly the construction of long-span continuous beam or multi span railway business line. The railway construction of multi span passenger overpass beam needs very complicated construction procedures, which is easy to produce large safety risks in the process of cast-in-place beam. Therefore, during the construction of multi span passenger overpass continuous beam railway business line, constructors must adopt various safety protection measures such as covering, isolation and reinforcement, avoid high-risk points to the greatest extent, fully understand the actual situation of construction, and select and apply appropriate construction scheme, so as to improve the quality and safety of railway construction. Based on this, this paper makes an in-depth analysis on the safety protection measures for the construction of multi span passenger overpass railway business line, and puts forward relevant suggestions on the safety management and implementation cases of the construction of additional passenger overpass in high-speed railway operation stations. The new overpass across multiple railway tracks and multiple passenger platforms at the high-speed railway station in operation has great safety risks to the high-speed trains, existing railway equipment, facilities, passengers and pedestrians. The safety monitoring, inspection contents and methods formulated according to the risk situation have a certain reference value for the bridge construction across the existing railway. 展开更多
关键词 railway construction high speed railway station construction construction of pedestrian overpass railway passenger overpass construction safety security management
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部