咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 8 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 网络空间安全
    • 4 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
  • 6 篇 理学
    • 5 篇 数学
    • 1 篇 物理学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 13 篇 security model
  • 3 篇 access control
  • 2 篇 database securit...
  • 2 篇 cloud computing
  • 2 篇 provable securit...
  • 2 篇 proxy signature
  • 1 篇 dynamic heteroge...
  • 1 篇 secure operating...
  • 1 篇 deep learning
  • 1 篇 architecture
  • 1 篇 learning with er...
  • 1 篇 bell-lapudula (b...
  • 1 篇 covert channel a...
  • 1 篇 remote attestati...
  • 1 篇 private cloud
  • 1 篇 blp model
  • 1 篇 multilevel secur...
  • 1 篇 bilinear maps
  • 1 篇 tusted subject
  • 1 篇 public key encry...

机构

  • 1 篇 华中科技大学
  • 1 篇 department of co...
  • 1 篇 cas key laborato...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 database and mul...
  • 1 篇 school of cybers...
  • 1 篇 school of softwa...
  • 1 篇 东北大学
  • 1 篇 institute of com...
  • 1 篇 the college of c...
  • 1 篇 college of crypt...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 school of scienc...
  • 1 篇 college of big d...
  • 1 篇 trusted computin...
  • 1 篇 the key laborato...
  • 1 篇 institute of com...

作者

  • 2 篇 yiliang han
  • 2 篇 shuaishuai zhu
  • 1 篇 冯玉才
  • 1 篇 张霞
  • 1 篇 mamoona anam
  • 1 篇 dai yiqi
  • 1 篇 s.arun mozhi sel...
  • 1 篇 朱虹
  • 1 篇 liu xian'gang zh...
  • 1 篇 xinyu li
  • 1 篇 彭成宝
  • 1 篇 bin wu
  • 1 篇 zhu hong zhu yi ...
  • 1 篇 zhang baowen
  • 1 篇 胡国政
  • 1 篇 d.stalin david
  • 1 篇 王元珍
  • 1 篇 chandraprabha ka...
  • 1 篇 程万军
  • 1 篇 xue haiwei

语言

  • 11 篇 英文
  • 2 篇 中文
检索条件"主题词=security model"
13 条 记 录,以下是1-10 订阅
排序:
A Generalized Information security model SOCMD for CMD Systems
收藏 引用
Chinese Journal of Electronics 2020年 第3期29卷 417-426页
作者: ZHANG Baowen CHANG Xiao LI Jianhua School of Cyberspace security Technology and Research Shanghai Jiaotong University
As a new security defense theory, Cyberspace mimic defense(CMD) provides an architecture named Dynamic heterogeneous redundancy(DHR) to enhance the defense level of system security. Due to the new dynamic defense mech... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Multilevel security model for Private Cloud
收藏 引用
Chinese Journal of Electronics 2014年 第2期23卷 232-235页
作者: XUE Haiwei ZHANG Yunliang GUO Zhien DAI Yiqi Department of Computer Science Tsinghua University
Towards data leak caused by misoperation and malicious inside users, we proposed a multilevel security model based on Bell-lapadula(BLP) model. In our model each subject was assigned with a security level. Subjects ca... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Formal Analysis on an Extended security model for Database Systems
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第5期13卷 519-522页
作者: ZHU Hong ZHU Yi LI Chenyang SHI Jie FU Ge WANG Yuanzhen Database and Multimedia Technology Research Institute Huazhong University of Science and Technology Wuhan 430074Hubei China
In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security mode... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
收藏 引用
Computer modeling in Engineering & Sciences 2023年 第8期136卷 1857-1878页
作者: Caifen Wang Bin Wu College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China School of Electronic and Information Engineering Lanzhou Jiaotong UniversityLanzhou730070China
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cloud security Service for Identifying Unauthorized User Behaviour
收藏 引用
Computers, Materials & Continua 2022年 第2期70卷 2581-2600页
作者: D.Stalin David Mamoona Anam Chandraprabha Kaliappan S.Arun Mozhi Selvi Dilip Kumar Sharma Pankaj Dadheech Sudhakar Sengan Department of Computer Science and Engineering IFET College of EngineeringVillupuram605108Tamil NaduIndia Department of Computer Sciences and Software Engineering Faculty of Basic and Applied SciencesInternational Islamic UniversityIslamabadPakistan Department of Information Technology Bannari Amman Institute of TechnologySathyamangalam638401Tamil NaduIndia Department of Computer Science Engineering DMI St.John the Baptist UniversityMangochiLilongweMalawi Department of Mathematics Jaypee University of Engineering and TechnologyGuna473226Madhya PradeshIndia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement and Gramothan(SKIT)Jaipur302017RajasthanIndia Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveli627152Tamil NaduIndia
Recently,an innovative trend like cloud computing has progressed quickly in InformationTechnology.For a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Automatic Analysis Approach Toward Indistinguishability of Sampling on the LWE Problem
收藏 引用
Tsinghua Science and Technology 2020年 第5期25卷 553-563页
作者: Shuaishuai Zhu Yiliang Han Xiaoyuan Yang the College of Cryptography Engineering Engineering University of People's Armed PoliceXi'an 710086China the Key Laboratory of Network and Information security under the People's Armed Police Engineering University of People's Armed PoliceXi'an 710086China
Learning With Errors (LWE) is one of the Non-Polynomial (NP)-hard problems applied in cryptographic primitives against quantum attacks.However,the security and efficiency of schemes based on LWE are closely affected b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization
收藏 引用
China Communications 2021年 第8期18卷 35-46页
作者: Shuaishuai Zhu Yiliang Han College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an 710086China Key Laboratory of Network and Information security under the People’s Armed Police Xi’an 710086China
Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally har... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On the security of TLS Resumption and Renegotiation
收藏 引用
China Communications 2016年 第12期13卷 176-188页
作者: Xinyu Li Jingy Xu Zhenfeng Zhang Dengguo Feng CAS Key Laboratory of Electromagnetic Space Information University of Science and Technology of China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences
The Transport Layer security(TLS) protocol is the most important standard on the Internet for key exchange. TLS standard supports many additional handshake modes such as resumption and renegotiation besides the full h... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design of secure operating systems with high security levels
收藏 引用
Science in China(Series F) 2007年 第3期50卷 399-418页
作者: QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China Institute of Software Chinese Academy of Sciences Beijing China School of Software and Microelectronics Peking University Beijing China Institute of Computing Technology Navy Beijing China
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Remote Attestation-Based Access Control on Trusted Computing Platform
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第3期15卷 190-194页
作者: LIU Xian'gang ZHANG Xing FU Yingfang SHEN Changxiang Institute of Computer Science and Technology Beijing University of Technology Beijing 100022 China
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this pa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论