期刊文献+
共找到382篇文章
< 1 2 20 >
每页显示 20 50 100
GNU/Linux环境下的安全日志系统的构建 被引量:3
1
作者 王震宇 尤晋元 《计算机工程》 EI CAS CSCD 北大核心 2005年第4期160-162,共3页
在现代网络化条件下,构建安全的日志系统对增强系统服务的可靠性具有非常实际的意义。文章分析了计算机安全对日志系统的主要需求,描述了在Gnu/Linux环境下构建安全日志系统的可靠方案及其实现。
关键词 日志安全 GNU/LINUX 一致性 可靠性
下载PDF
论商业秘密的司法鉴定 被引量:6
2
作者 张炳生 《宁波大学学报(人文科学版)》 2012年第6期1-7,共7页
商业秘密是具有秘密性、价值性和管理性的商业信息,包括技术信息和经营信息。在涉及商业秘密纠纷中,纳入司法鉴定的范围是技术信息中的秘密性,鉴定中应当正确界定"公众"的概念、"知悉"的含义和"普遍知悉"... 商业秘密是具有秘密性、价值性和管理性的商业信息,包括技术信息和经营信息。在涉及商业秘密纠纷中,纳入司法鉴定的范围是技术信息中的秘密性,鉴定中应当正确界定"公众"的概念、"知悉"的含义和"普遍知悉"的相对性。在商业秘密司法鉴定实践中,鉴定机构的资质问题,鉴定程序中当事人的举证责任问题和公开出版物与秘密性的相互关系问题是特别需要注意的问题。 展开更多
关键词 商业秘密 秘密性 价值性 管理性 司法鉴定
下载PDF
新形势下高校机要保密工作的挑战与思考 被引量:6
3
作者 李晶 《湖州师范学院学报》 2015年第1期109-112,共4页
基于当下高校对外交流频繁、人才流动增多、参与政府工作增加、办公自动化程度高等情况,在分析了新形势下高校机要保密工作面临的新挑战基础上,提出要做好高校机要保密工作,必须完善机要保密体系,加强机要保密制度建设,组建一支高素质... 基于当下高校对外交流频繁、人才流动增多、参与政府工作增加、办公自动化程度高等情况,在分析了新形势下高校机要保密工作面临的新挑战基础上,提出要做好高校机要保密工作,必须完善机要保密体系,加强机要保密制度建设,组建一支高素质的机要人员队伍,创新工作方法,加强对涉密载体和涉密人员的管理,严防失密、泄密事件的发生。 展开更多
关键词 高校 机要 保密 挑战 思考
下载PDF
从机要到EMS:高校学生档案寄送方式的嬗变 被引量:5
4
作者 车向清 《兰台世界》 2017年第3期50-52,共3页
随着快递业务的成熟以及现代化手段在各个领域的广泛应用,快递以其速度快、易查询等优势得到人们的认可。当前高校学生档案寄送方式由机要到邮政快递的转变已成事实,但在实施过程中还面临一些挑战,因此面对邮政快递这种新的档案寄送方式... 随着快递业务的成熟以及现代化手段在各个领域的广泛应用,快递以其速度快、易查询等优势得到人们的认可。当前高校学生档案寄送方式由机要到邮政快递的转变已成事实,但在实施过程中还面临一些挑战,因此面对邮政快递这种新的档案寄送方式,政府、学校、邮政快递公司以及档案接收单位,需要有针对性地采取积极措施,对相关工作进行调整和完善。 展开更多
关键词 高校 学生档案 寄送方式 机要 EMS
下载PDF
论商业秘密的法律保护 被引量:2
5
作者 曲三强 《现代财经(天津财经大学学报)》 CSSCI 2003年第12期3-8,共6页
中国加入WTO以后,市场竞争变得日趋激烈,中外商战交织开展。在国内市场与国际市场接轨的同时,也要求国内法与国际公约接轨。在这种情况下,用法律的手段保护商业秘密已不仅仅是那些登陆中国市场的外商们的要求,而且还是国内企业家们的普... 中国加入WTO以后,市场竞争变得日趋激烈,中外商战交织开展。在国内市场与国际市场接轨的同时,也要求国内法与国际公约接轨。在这种情况下,用法律的手段保护商业秘密已不仅仅是那些登陆中国市场的外商们的要求,而且还是国内企业家们的普遍要求。商业秘密是一种知识产权。不过到目前为止,对商业秘密的认识还比较浮浅。由于对商业秘密缺乏深入细致的研究,还不能为立法和司法提供强有力的理论支撑;因此,对商业秘密进行全面的理论透视,进而勾勒出法律基础的轮廓,不仅是中国经济开放发展的需要,也是中国经济走向法治的必然要求。 展开更多
关键词 保密性 商业秘密 不正当竞争
下载PDF
基于安全FTP的计算机加密通信系统的研究与设计 被引量:3
6
作者 何文才 张媛媛 +2 位作者 刘培鹤 牛晓蕾 杜鹏 《网络安全技术与应用》 2007年第1期92-94,共3页
本文提出一种基于安全FTP的计算机加密通信系统,该系统采用密文的形式传输机密信息,对传输的数据提供保密和认证的功能。
关键词 FTP 加密 密文
原文传递
The Role of Attorney’s Request as a Communication Instrument in Advocacy
7
作者 Mykola Inshyn Rostyslav Shchokin +2 位作者 Inna Semenets-Orlova Olha Kravchenko Maryna Barsuk 《Journal of Forensic Science and Medicine》 2024年第1期34-41,共8页
Background:The analysis of communication tools used in advocacy is currently a topical research problem in the context of dynamic information communication in the sociopolitical space.Aims and Objectives:The aim of th... Background:The analysis of communication tools used in advocacy is currently a topical research problem in the context of dynamic information communication in the sociopolitical space.Aims and Objectives:The aim of the study was to analyze the attorney’s request as a means of obtaining information by attorneys to carry out their professional activity.Materials and Methods:The research was conducted with the help of numerous methods,the method of expert interviews being the leading one.It was used to single out the procedural characteristics and prospects of the attorney’s request in presentday Ukraine.Results:Attention is drawn to a number of issues that complicate the process of submitting attorney’s request and a proper use of this mechanism and procedure by an attorney.The ratification of the EU-Ukraine Association Agreement opens up new prospects not only for Ukrainian and European producers but also provides for interesting objectives for attorneys to consult the private sector in the process of building new markets.Conclusion:In this article,it was suggested to compare and analyze the issue of the attorney’s request in Ukrainian and Polish legal framework.As a result of the research,problems were identified,and proposals were made for a simplified procedure for submitting an attorney’s request as a communication instrument in advocacy. 展开更多
关键词 Attorney’s request confidential information free legal aid legal communication legal practice
原文传递
企业敏感涉密数据分级分类管理策略探讨 被引量:4
8
作者 陶镇威 《现代工业经济和信息化》 2019年第10期79-80,共2页
为了加强企业信息系统数据的使用管理与保护,规范企业敏感、涉密数据使用流程,实现数据申请、审批、执行、使用、回收全过程管控,防范敏感、涉密数据泄露、违法传播和不合规使用的风险,开展企业敏感涉密数据分级分类策略制定与实施,保... 为了加强企业信息系统数据的使用管理与保护,规范企业敏感、涉密数据使用流程,实现数据申请、审批、执行、使用、回收全过程管控,防范敏感、涉密数据泄露、违法传播和不合规使用的风险,开展企业敏感涉密数据分级分类策略制定与实施,保障企业数据安全。 展开更多
关键词 敏感 涉密 数据 分级 分类 安全
下载PDF
Identifiability Analysis of Load Model Parameters by Estimating Confidential Intervals 被引量:3
9
作者 Xinran Zhang Chao Lu +3 位作者 Ying Wang Qiantu Ruan Hongbo Ye Weihong Wang 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第5期1666-1675,共10页
The identification of load model parameters from practical measurement data has become an essential method to build load models for power system simulation,analysis and control.In practical situations,the accuracy of ... The identification of load model parameters from practical measurement data has become an essential method to build load models for power system simulation,analysis and control.In practical situations,the accuracy of the load model parameters identification results is impacted by data quality and measurement accuracy,which leads to the problem of identifiability.In this paper,an identifiability analysis methodology of load model parameters,by estimating the confidential intervals(CIs)of the parameters,is proposed.The load model structure and the combined optimization and regression method to identify the parameters are first introduced.Then,the definition and analysis method of identifiability are discussed.The CIs of the parameters are estimated through the profile likelihood method,based on which a practical identifiability index(PII)is defined to quantitatively evaluate identifiability.Finally,the effectiveness of the proposed analysis approach is validated by the case study results in a practical provincial power grid.The results show that the impact of various disturbance magnitudes,measurement errors and data length can all be reflected by the proposed PII.Furthermore,the proposed PII can provide guidance in data length selection in practical load model identification situations. 展开更多
关键词 confidential interval Load modeling parameter estimation practical identifiability
原文传递
招投标网站安全问题研究 被引量:4
10
作者 国强 吕述望 《计算机工程与设计》 CSCD 北大核心 2007年第2期320-321,357,共3页
针对招投标网站在建设过程中面对的一些安全问题,如怎样保证投标书传输和存储的安全性,如何认证投标人的真实身份、如何保证投标书在传输和存储过程中的完整性、如何确认投标书提交的时效性以及对招投标过程(主要是投标书的递交、投标... 针对招投标网站在建设过程中面对的一些安全问题,如怎样保证投标书传输和存储的安全性,如何认证投标人的真实身份、如何保证投标书在传输和存储过程中的完整性、如何确认投标书提交的时效性以及对招投标过程(主要是投标书的递交、投标书的传输和存储、投标书的解封)出现的问题和纠纷如何进行责任认定等进行了分析,并针对这些问题提出了解决思路和相关解决方案。 展开更多
关键词 身份认证 保密性 数据完整性 责任认定 数字签名 时间戳
下载PDF
浅析招标投标中的保密问题 被引量:2
11
作者 郭锟明 《广西电力工程》 2001年第2期10-12,共3页
招投标是一种市场竞争行为 ,为规范招投标行为 ,保证招投标的公平、公开、公正 ,《招标投标法》规定了多项保密事项。本文对招投标的保密事项主要包括潜在投标人的保密、标底的保密、评委的保密、评标的保密等进行了分析。
关键词 招标 投标 保密 工程建设项目
下载PDF
Increase of Indicator Values of Identification Systems Quality on the Recognition of Human Face on the Basis of Photo Portraits 被引量:1
12
作者 Tofiq Kazimov Shafagat Mahmudova 《Intelligent Control and Automation》 2013年第2期191-198,共8页
In this paper, algorithms of automatic identification of persons on the basis of their photographs are considered. For identification of persons, the comparative analysis of control systems by bases of images created ... In this paper, algorithms of automatic identification of persons on the basis of their photographs are considered. For identification of persons, the comparative analysis of control systems by bases of images created in the different periods is carried out and their applied possibilities are shown. 展开更多
关键词 RECOGNITION Anthropometrical Identification GEOMETRICAL Characteristics confidential an INTERVAL
下载PDF
CONFIDENTIAL GEODATA PROTECTION IN CHINA: CHALLENGES, LIABILITY CONCERNS AND POSSIBLE SOLUTIONS
13
作者 ZHAO Xiaobo 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2016年第3期551-574,共24页
In recent years, a growing number of foreign companies and individuals were involved in geodata violations in China. The Chinese government is facing greater pressure to protect confidential geodata within its territo... In recent years, a growing number of foreign companies and individuals were involved in geodata violations in China. The Chinese government is facing greater pressure to protect confidential geodata within its territory. Geodata violations occurred in the course of illegal mapping and surveying, geographical and geological data collection and transactions. Although China has reformed laws and regulations to refine some aspects of confidential geodata management, existing rules remain ambiguous and controversial. This article aims to address the liability concerns raised among foreign companies from geodata violations. After defining the three most significant concepts, geological data, mapping and surveying, and state secrets, this article reviews the status quo, reasons for and impacts of geodata violations in China, to find out how big the problem is and why it matters. It then explores the legislative framework of state secrets protection in the context of geodata management; special focus is put on liability issues and problems of the current system. As a response to existing arguments, possible ways to improve confidential geodata protection and some practical tips for foreign businesses are offered. 展开更多
关键词 confidential geodata surveying and mapping state secret LIABILITY China
原文传递
Confidential computing and related technologies:a critical review 被引量:1
14
作者 Muhammad Usama Sardar Christof Fetzer 《Cybersecurity》 EI CSCD 2023年第4期26-32,共7页
This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the defi... This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the definitions by CCC are ambiguous,incomplete and even conflicting.We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair.We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues.These recommendations are the first step towards more precise definitions and reliable comparisons in the future. 展开更多
关键词 confidential Computing(CC) Trusted Execution Environment(TEE) Homomorphic Encryption(HE) Trusted Platform Module(TPM) Formal methods
原文传递
国家标准项目《信息安全技术 机密计算通用框架》试点实践 被引量:1
15
作者 王惠莅 邱勤 +2 位作者 庞婷 葛小宇 张高山 《China Standardization》 2023年第S01期52-56,共5页
Data security and privacy protection have become the focus of cybersecurity protection in many countries.The utilization of confidential computing technology can significantly enhance data security.However,there are a... Data security and privacy protection have become the focus of cybersecurity protection in many countries.The utilization of confidential computing technology can significantly enhance data security.However,there are a variety of confidential computing technology routes,with significant differences in the principles and interfaces of implementation.There is an urgent need to develop relevant standards and specifications and guide the design,development,deployment and application of confidential computing related products.This paper introduces the development progress of the national standard project“Information security techniques—General framework for the confidential computing”and its pilot application scenarios across various industries.Additionally,it proposes suggestions on modifying and improving the standard to promote the healthy development of the confidential computing industry ecosystem. 展开更多
关键词 CYBERSECURITY data security privacy protection confidential computing
下载PDF
利用文档加密系统增强企业保密措施 被引量:1
16
作者 侯咏 王佩京 《装备制造技术》 2013年第7期229-230,237,共3页
主要论述了企业如何利用文档加密软件这一技术手段,强化企业的保密系统,确保企业技术创新的安全性,并详细说明文档加密软件项目在企业好实施以及应用,以提高企业在全球化经济中和全球性金融危机中的核心竞争力。
关键词 文档加密 保密性 安全性 软件应用
下载PDF
Secure degrees of freedom for general MIMO interference channel under rank-deficiency
17
作者 Wang Qiang Zhang Yijia +3 位作者 Zhang Tianjiao Zhang Wenqi Gao Yue Tafazolli Rahim 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第3期65-77,共13页
As a more trackable performance metric for secrecy capacity,the secure degrees of freedom(SDoF)are widely studied for most multiuser networks in the high signal to noise ratio(SNR)region.However,the SDoF for these net... As a more trackable performance metric for secrecy capacity,the secure degrees of freedom(SDoF)are widely studied for most multiuser networks in the high signal to noise ratio(SNR)region.However,the SDoF for these networks under rank-deficiency and arbitrary antenna configurations have not yet been determined.In this paper,the SDoF of two-user general multiple-input multiple-output(MIMO)interference channel with confidential messages(ICCM)under rank-deficiency are derived.For the two-user rank-deficient MIMO ICCM,the model is generalized to fully asymmetric settings,where the transmitters and receivers are equipped with arbitrary antennas.The outer bound of SDoF is the union of three outer bounds that are based on the Fano’s inequality and the secrecy constraints,the secrecy penalty lemma and the role of a helper lemma,and the transmitters cooperation,respectively.The SDoF region is subdivided into five regions according to the number of transceivers antennas,and each region has an achievability scheme with designed null space transmission and alignment techniques.Numerical results indicate that the SDoF increase at first and then decrease as the rank of the channel matrix decreases.The SDoF improve by increasing the transmitting antenna or reducing receiving antenna,but the effect of the transmitting antenna is greater. 展开更多
关键词 confidential messages interference channel multiple-input multiple-output(MIMO) rank-deficient secure degrees of freedom(SDoF)
原文传递
Crowd sensing data delivery based on tangle DAG network
18
作者 Chen Hui Jiang Xiaoling +1 位作者 Wu Tianting Mou Xingyu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第3期88-98,共11页
In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a... In view of the fact that current data delivery methods are not enough to meet the security requirements of today’s distributed crowd sensing,and the data delivery methods are not flexible enough,this paper proposes a crowd sensing data interaction method based on tangle directed acyclic graph(DAG)network.In this method,users and platforms are regarded as nodes of the network in the process of performing crowd sensing tasks.First,the heaviest chain is generated through the main chain strategy to ensure the stability of the network.Then,the hidden Markov model(HMM)prediction model is used to improve the correlation of the perceived data to improve the performance.Then,the confidential transaction and commitment algorithm is used to ensure the reliability of the transaction,overcome the security risks faced by the trusted third party,and simplify the group intelligence aware transaction mode.Finally,through simulation experiments,the security and feasibility of the group intelligence aware data delivery method based on tangle DAG network are verified. 展开更多
关键词 data delivery crowd sensing tangle directed acyclic graph(DAG) confidential transactions
原文传递
Confidential machine learning on untrusted platforms:a survey
19
作者 Sharma Sagar Chen Keke 《Cybersecurity》 EI CSCD 2021年第1期461-479,共19页
With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)fo... With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)for scalable processing or collaborative learning.Thus,sensitive data and models are in danger of unauthorized access,misuse,and privacy compromises.A relatively new body of research confidentially trains machine learning models on protected data to address these concerns.In this survey,we summarize notable studies in this emerging area of research.With a unified framework,we highlight the critical challenges and innovations in outsourcing machine learning confidentially.We focus on the cryptographic approaches for confidential machine learning(CML),primarily on model training,while also covering other directions such as perturbation-based approaches and CML in the hardware-assisted computing environment.The discussion will take a holistic way to consider a rich context of the related threat models,security assumptions,design principles,and associated trade-offs amongst data utility,cost,and confidentiality. 展开更多
关键词 confidential computing Cryptographic protocols Machine learning
原文传递
An efficient human detection method for multi-pedestrian tracking
20
作者 许伟村 赵清杰 胡豁生 《Journal of Central South University》 SCIE EI CAS 2013年第12期3552-3563,共12页
Traditional human detection using pre-trained detectors tends to be computationally intensive for time-critical tracking tasks, and the detection rate is prone to be unsatisfying when occlusion, motion blur and body d... Traditional human detection using pre-trained detectors tends to be computationally intensive for time-critical tracking tasks, and the detection rate is prone to be unsatisfying when occlusion, motion blur and body deformation occur frequently. A spatial-confidential proposal filtering method(SCPF) is proposed for efficient and accurate human detection. It consists of two filtering phases: spatial proposal filtering and confidential proposal filtering. A compact spatial proposal is generated in the first phase to minimize the search space to reduce the computation cost. The human detector only estimates the confidence scores of the candidate search regions accepted by the spatial proposal instead of global scanning. At the second phase, each candidate search region is assigned with a supplementary confidence score according to their reliability estimated by the confidential proposal to reduce missing detections. The performance of the SCPF method is verified by extensive tests on several video sequences from available public datasets. Both quantitatively and qualitatively experimental results indicate that the proposed method can highly improve the efficiency and the accuracy of human detection. 展开更多
关键词 human detection spatial proposal filtering confidential proposal filtering
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部