共查询到20条相似文献,搜索用时 109 毫秒
1.
2.
结合云计算安全事件以及云计算平台架构进行分析,给出云计算平台的安全特点,在传统互联网安全基础上,云计算平台需要面临数据安全、网络安全、虚拟化安全等问题,还给出一整套云计算平台的安全应对措施,指导运营商部署云计算平台。 相似文献
3.
本文以杭州市广播电视安全播出指挥调度平台设计为例,简要介绍了安全播出指挥调度平台的关键技术、平台框架、业务子系统等情况,特别对安全播出指挥调度平台的各个子系统做了重点讲解,对相关地级市建设广播电视安全播出指挥调度平台具有一定的借鉴作用。 相似文献
4.
为了实现医院信息网络平台的安全管理与安全运维。从医院信息平台的实际出发,根据国家信息安全等级保护工作的指导意见的要求,从需求、规划、设计、完成安全管理与安全运维,实现了医院信息平台安全体系的整体方案工作。实践表明,该方法使医院信息网络平台有了安全保障。 相似文献
5.
6.
文中主要对交通电子政务3G移动办公的安全技术进行研究。从移动办公平台自身的特点出发,分析该平台可能遭受到的安全威胁,进行移动办公平台安全体系结构设计,并针对主要安全威胁,提出了交通电子政务3G网络办公安全解决方案,以最大限度地提高该平台的稳定性和安全性。 相似文献
7.
面对日益增大的网络安全威胁,电信运营商需要提高业务平台的安全防护能力.结合电信运营商业务平台的系统现状,在对各类业务平台进行安全分级的基础上,规范划分不同网络结构业务平台的安全域,并针对不同安全等级平台设计合理可控的安全防护策略和安全基线,使业务平台形成安全、清晰、便于管控的网络布局和系统架构. 相似文献
8.
重庆广播电视集团融合新闻中心云平台系统以云计算体系为基础架构,由第三方提供IT基础架构的云服务,多租户共享云计算资源。由于云平台安全性与传统IT基础架构安全性具有较大差异,云平台安全性是重庆广电集团融合新闻中心云平台的重要关注点。本文主要从网络安全、虚拟主机安全、数据安全、应用安全和云平台安全等几个方面介绍该系统的安全设计。 相似文献
9.
简要介绍了多媒体家庭平台MHP的系统和安全规范,分析多媒体家庭平台存在的安全问题,比较与一般平台的安全问题的差异,得出多媒体家庭平台安全性方面的特点. 相似文献
10.
11.
《电子学报:英文版》2016,(4):753-760
Due to the use of the cloud computing technology, the ownership is separated from the adminis-tration of the data in cloud and the shared data might be migrated between different clouds, which would bring new challenges to data secure creation, especially for the data privacy protection. We propose a User-centric data secure creation scheme (UCDSC) for the security requirements of resource owners in cloud. In this scheme, a data owner first divides the users into different domains. The data owner encrypts data and defines different secure managing poli-cies for the data according to domains. To encrypt the data in UCDSC, we present an algorithm based on Access con-trol conditions proxy re-encryption (ACC-PRE), which is proved to be master secret secure and Chosen-ciphertext attack (CCA) secure in random oracle model. We give the application protocols and make the comparisons between some existing approaches and UCDSC. 相似文献
12.
目前配电终端安全加密芯片与MCU之间主要采用SPI总线进行同步通信,由MCU输出网口数据实现配电终端应用层安全加密通信。为进一步提高安全加密防护能力,本文选用IPSEC安全加密芯片直接输出网口数据,芯片与MCU之间采用异步数据传输,实现网络层安全加密防护功能。在此基础上研究了基于安全加密芯片的配电网络双层加密防护应用,通过对内嵌安全加密芯片的终端进行软硬件设计,并研究配电终端与主站之间的加密应用,提升了配电终端加密通信的安全性与可靠性。通过IPSEC极限通信测试、应用加密测试以及现场实际测试,验证了内嵌安全加密芯片的配电终端的加密防护性能。 相似文献
13.
文中对信息安全和量子保密通信的技术现状进行了介绍,对量子保密通信在数据传输安全方面的重要作用进行分析,对量子保密通信发展趋势和应用前景进行了分析和探讨。 相似文献
14.
15.
In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5× and the secure data transaction energy by more than 1.5× during data transmission and by more than 2.5× during data reception. 相似文献
16.
17.
18.
Access数据库的安全性分析 总被引:2,自引:0,他引:2
随着AcceSS数据库的应用越来越广,对其安全性的需求也越来越高,针对现有Access数据库文件安全技术的局限与不足,提出一种新的数据库安全策略,可以有效解决Access数据库的安全问题. 相似文献
19.
20.
MA Zhaofeng 《电子学报:英文版》2017,26(4)
Data leakage prevention (DLP) is very im-portant for sensitive or unauthorized data protection, how-ever, most current DLP technologies are based on con-tent monitor, detection and filtering, which can be easily bypassed or cheated. We propose a thorough and high-level Content protection secure scheme of DLP (CPSec DLP) based on kernel-level mandatory encryption, in which we proposed mutual authentication and key agree-ment method between client and server, and we adopted SM2 algorithm for session key management; and we pro-pose kernel-level mandatory secure middleware for un-structured data protection, in which the secure middleware works in File system driver (FSD) layer supporting for"write-encryption, open-decryption" operation, once the data is written to storage space either in hard-disk or USB disk the data is mandatorily encrypted, while when the data is open the mandatory secure middleware decrypts the data to plain in system memory. Moreover we propose data share and delivery among domain internal users and external customers. In the CPSec DLP scheme, the encryp-tion algorithms, security policy and rules can be dynami-cally parameterized when necessary, while in the lifecycle the data management can only be used according to its usage control rules, such as read-only, write, save, print, export, backup rights. Upon the proposed CPSec DLP, we implemented the CPSec DLP system in kernel-level driver layer based on FSD, which supports parameterized process and document format for unstructured data leakage pro-tection. Large amount of experiments manifest the pro-posed scheme is secure, reliable, extendible and efficient for kinds of format unstructured data leakage protection. 相似文献