首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
信息安全保障与信息系统本身一样是一个复杂的系统.为了能够很好反映信息安全保障系统的功效,需要用可量化的参数作为衡量指标.从中国信息安全保障的国家战略、管理策略、工程规范和技术措施方面出发,提出了以"安全基线政策"(Security Baseline Policy)为核心的信息安全评价指标体系(Indicator);研究了具有双重反馈的评价思想和流程.利用信息安全保障评价指标体系有助于建立信息系统安全保障的长效机制,增强信息系统的安全性.  相似文献   

2.
Quality assurance in micro production   总被引:1,自引:1,他引:1  
Quality assurance is essential for an efficient support of all developing and manufacturing processes and activities with the forefront objective to reach robust processes with a high throughput of parts meeting their functional requirements. Due to the lack of a broad base of experiences regarding the still developing manufacturing technologies in micro production an adequate quality assurance plays an even more important role in order to efficiently support the transition of micro production processes from non-robust to stable processes. Thereby, quality assurance faces particular challenges in micro production, which render a reasonable application of common quality methods difficult or even impossible. Consequently, it is essential to develop new concepts or adjust widely applied quality assurance methods in order to support and continuously improve the development- and manufacturing processes in micro production. Within the scope of the Collaborative Research Center (SFB) 499 “Design, production and quality assurance of primary shaped micro components manufactured in ceramic and metallic materials” the approach of the subproject working on the topic quality assurance is threefold: (i) An efficient and process-accompanying information management has been implemented and will be enhanced further on. (ii) Specifically adjusted preventive methods of quality assurance have been developed and applied. (iii) In order to implement an efficient operational quality assurance performance data of the manufacturing processes has been collected and provided. In the future this supply of data will be used to control and improve the manufacturing processes.  相似文献   

3.
In this paper we discuss the issues relating the evaluation and reporting of security assurance of runtime systems. We first highlight the shortcomings of current initiatives in analyzing, evaluating and reporting security assurance information. Then, the paper proposes a set of metrics to help capture and foster a better understanding of the security posture of a system. Our security assurance metric and its reporting depend on whether or not the user of the system has a security background. The evaluation of such metrics is described through the use of theoretical criteria, a tool implementation and an application to a case study based on an insurance company network.  相似文献   

4.
通用标准(Common Criteria)提供了衡量系统安全性的流行准则。本文主要提出通过各类保证措施,如何构建符合CC标准的高保证安全信息系统。文中首先给出了CC的评估模型、评估过程和安全保证的具体要求。然后以开发安全审计系统为例,分析了系统安全功能和保证要求的产生、审计系统的实现框架以及为达到标准要求而在系统开发过程中使用的各种保证证据和保证措施。最后,又分析了审计系统对整个系统的性能影响因素,并提出了改进办法。本文通过深入剖析通用标准中各个保证要求的内涵,为开发具有高保证要求的信息系统提供了理论指导和实现方法。  相似文献   

5.
随着神经网络等技术的快速发展,人工智能被越来越多地应用到安全关键或任务关键系统中,例如汽车自动驾驶系统、疾病诊断系统和恶意软件检测系统等.由于缺乏对人工智能软件系统全面和深入的了解,导致系统时常发生严重错误.人工智能软件系统的功能属性和非功能属性被提出以加强对人工智能软件系统的充分认识和质量保障.经调研,有大量研究者致力于功能属性的研究,但人们越来越关注于人工智能软件系统的非功能属性.为此,专注于人工智能软件系统的非功能属性,调研了138篇相关领域的论文,从属性定义、属性必要性、属性示例和常见质量保障方法几个方面对目前已有的研究工作进行系统的梳理和详细的总结,同时重新定义和分析了非功能属性之间的关系并介绍了人工智能软件系统研究中可以用到的开源工具.最后,展望了人工智能软件系统非功能属性的未来研究方向和挑战,以期为该领域的研究人员提供参考.  相似文献   

6.
What drives global ICT adoption? Analysis and research directions   总被引:1,自引:0,他引:1  
Information and communication technology (ICT) adoption is increasing globally and offers unique opportunities for information systems (IS) and electronic commerce researchers to undertake research that will have an impact. The purpose of this article is to survey the academic literature on this topic and provide research directions for future work. We analyze economic, social and other factors that drive global ICT adoption and the individual, organizational, industry and economy impacts. We do this with respect to a set of relevant problems, technology opportunities, theories, research methods, and solutions. The integration of these areas enables us to establish a balanced picture of the current state of global ICT adoption research. It also offers a useful means to analyze the kinds of research that needs to be pursued to make additional progress in the related area of e-commerce research. With these ideas in mind, we present five emerging research directions in three different categories: new economic geography, rational expectations theory, and new empirical methods. We also analyze several topics in the global arena of emerging technologies.  相似文献   

7.
Nowadays information and communication security has recently emerged as one of the most important tasks in the field of network management, operations and maintenance. The information security issue is of particular importance to the Taiwan Academic Network, a network which connects the networks of educational and research institutions in Taiwan. ICT environment in educational systems involves vast connected units and is featuring complexity, diversity and openness. In this paper, we investigate current situation of Taiwan Ministry of Education ICT security development and provide a case study. We also discussed challenges and solutions for improving ICT security environment in educational system.  相似文献   

8.
Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs) assessment and continuous quality improvement represent core components of the quality assurance system (QAS). Current assessment methods suffer deficiencies related to accuracy and reliability, and they lack well-organized processes for continuous improvement planning. Moreover, the absence of automation, and integration in QA processes forms a major obstacle towards developing efficient quality system. There is a pressing need to adopt security protocols that provide required security services to safeguard the valuable information processed by QAS as well. This research proposes an effective methodology for LOs assessment and continuous improvement processes. The proposed approach ensures more accurate and reliable LOs assessment results and provides systematic way for utilizing those results in the continuous quality improvement. This systematic and well-specified QA processes were then utilized to model and implement automated and secure QAS that efficiently performs quality-related processes. The proposed system adopts two security protocols that provide confidentiality, integrity, and authentication for quality data and reports. The security protocols avoid the source repudiation, which is important in the quality reporting system. This is achieved through implementing powerful cryptographic algorithms. The QAS enables efficient data collection and processing required for analysis and interpretation. It also prepares for the development of datasets that can be used in future artificial intelligence (AI) researches to support decision making and improve the quality of academic programs. The proposed approach is implemented in a successful real case study for a computer science program. The current study serves scientific programs struggling to achieve academic accreditation, and gives rise to fully automating and integrating the QA processes and adopting modern AI and security technologies to develop effective QAS.  相似文献   

9.
基于智能协作技术的信息系统安全体系结构研究   总被引:5,自引:0,他引:5  
文章介绍了智能协作技术在信息系统安全领域的应用,给出了一种新的信息系统安全体系结构。首先,基于智能协作中的主体技术建立了一种新型的信息系统安全体系概念结构,在信息系统的安全体系结构中,每一个节点上有一组智能主体:智能安全主体主要是一些具体的安全机制和模型;一个服务器主体,主要负责节点间的通信;一个管理者主体,主要负责各智能安全主体间的协同和调度以及过程控制;一个计划者主体,主要负责提供有效的通信计划和智能安全主体间资源的有效调度和利用。其次,从系统的角度简要说明了该安全体系的工作过程和原理。最后,就该安全体系的实现进行了简要的探讨。  相似文献   

10.
任务保证是国外航天领域为确保复杂系统在任务周期内的安全、可靠而提出的一种工作方式。随着基于模型的系统工程技术近年来的迅猛发展,将其与任务保证相结合而形成的基于模型的任务保证概念开始得到广泛的应用和认可。这为复杂系统在安全性、可靠性工作方法上的进一步发展提供了有利条件。介绍了基于模型的任务保证概念,并对其所涉及的安全/保证案例、基于模型的系统工程、目标结构表示等关键要素,以及其目前在复杂系统设计中的典型应用进行了阐述。对基于模型的任务保证在未来的发展方向进行了展望。为基于模型的任务保证在复杂系统中的应用提供了理论参考。  相似文献   

11.
目前主流的网络安全防护体系是外嵌的,安全体系与业务体系分离,安全产品相互孤立,在防护能力上难以高效应对越来越复杂的网络安全挑战。网络安全从外向内进行强基,势在必行。将网络安全的业务场景归纳为组织、厂商、监管和威胁四方视角,各视角具有不同的业务目标。从四方视角的共性和个性出发,系统性归纳网络安全生态的能力需求,提出内禀安全方法论。内禀安全能力是指ICT组件原生支撑监测、防护和溯源等安全功能的能力。内禀安全能力对网络安全具有基础支撑作用,本身不是最终的安全功能实现,与现有的“内生安全”“内设安全”等方法论所针对的问题不同。内禀安全强调网络组件内在的安全赋能禀赋,有两种方式可以发掘这种禀赋,一是通过先天安全能力激活,二是外嵌能力内化,对外在逻辑上表现出自体免疫。此类组件的优势之一在于业务与安全的内聚,能够透明化感知安全态势、定制化配置安全策略、贴身化执行安全保护;优势之二在于将业务功能与安全功能进行合并封装,简化整体工程架构,降低网络管理复杂度。进一步提出了内禀安全支撑能力框架,对符合内禀安全理念的安全能力进行归纳和枚举,将安全支撑能力分为采集、认知、执行、协同和弹复5类,并进一步介绍各类能力的子类型和基础ICT技术。基于该框架,介绍了典型安全业务场景在内禀安全理念下的增强实现。  相似文献   

12.
计算机信息系统安全体系设计   总被引:5,自引:1,他引:5  
本文首先介绍了计算机信息系统安全体系研究的现状与发展趋势;然后论述了计算机信息系统纵深防御与保障体系的体系结构,并对组成该体系的各子系统的功能与组成进行了阐述,最后提出了安全体系的设计方案。  相似文献   

13.
信息安全评估是保证信息安全保障长效机制的关键。以动态系统控制理论为基础,针对信息系统的信息安全评佑问题进行了研究,设计了系统化信息安全保障框架模型,提出了信息安全系统化的评佑模型,给出了系统化评估的方法和流程,以为信息系统的信息安全评估打下基础。  相似文献   

14.
吴丹  王志英 《计算机科学》2003,30(11):152-154
The information security evaluation is an important part of information field. It is a general method to execute evaluation to the information security products under the instruction of Common Criteria (CC).A new method of information security evaluation, based on the combination of CC and Systems Security Engineering Capability Maturity Model (SSE-CMM),has been proposed in the paper. The basic idea of this method is using the reference of the security system engineer. Based on the experiment of a Target of Evaluation (TOE)in CC, the evaluation result of security assurance by this new method is proved to be more accurate, more comprehensive and more acceptable.  相似文献   

15.
Cyber-physical systems (CPS) are characterized by integrating cybernetic and physical processes. The theories and applications of CPS face the enormous challenges. The aim of this paper is to provide a latest understanding of this emerging multi-disciplinary methodology. First, the features of CPS are described, and the research progresses are summarized from different components in CPS, such as system modeling, information acquisition, communication, control and security. Each part is also followed by the future directions. Then some typical applications are given to show the prospects of CPS.   相似文献   

16.
金英  刘鑫  张晶 《计算机科学》2011,38(5):14-19
近年来,软件主动式防御思想在软件安全性保障中的地位越来越高,它是一种积极的保障软件安全性的思想,可有效地构建高可信性软件。安全需求的获取是软件安全性保障中最关键的部分,是主动式防御首要完成的任务并且也是最难完成的部分。针对典型的安全需求获取方法,从它们的研究途径、应用情况等方面进行比较和分析,总结并讨论了安全需求获取方法的状况及其未来的发展趋势。上述工作将对安全需求获取方法的研究和实践应用提供有益参考。  相似文献   

17.
近年来,物联网大规模应用于智能制造、智能家居、智慧医疗等产业,物联网的安全问题日益突出,给物联网的发展带来了前所未有的挑战。安全测评技术是保障物联网安全的重要手段,在物联网应用的整个开发生命周期都需要进行安全测评工作,以保证物联网服务的安全性和健壮性。物联网节点面临计算能力、体积和功耗受限等挑战,智慧城市等应用场景提出了大规模泛在异构连接和复杂跨域的需求。本文首先总结了目前物联网中常用的安全测评方法和风险管理技术;然后从绿色、智能和开放三个方面分析物联网安全技术的发展现状和存在的安全问题,并总结了物联网安全测评面临的挑战以及未来的研究方向。  相似文献   

18.
Developing, implementing and assimilating information technologies into organizational practices pose significant technical and social challenges. In this paper, we explore technology use mediation (TUM) processes in two cases of electronic medical record system use in two healthcare organizations. In our analysis, we examine contextual influences on mediation and consider TUM processes and outcomes in projects utilizing modern systems development methods. We found that crucial TUM actions occurred during systems development phases as well as during system use, that mediation was vitally important with these specialized IT artefacts, and that system configuration required changes to software infrastructure and code. Organizational size influenced the availability and the effectiveness of mediation resources; with adequate resources committed to the task, the institutional environment presented substantial, but not insurmountable, challenges to technology use mediation. We consider implications for practice and suggest future research directions.  相似文献   

19.
随着网络业务的多元化与网络基础服务能力的不断提升,企业网、云计算、数据中心等大量新兴应用场景迅速丰富,传统网络已不能满足其不断涌现的可扩展性、可管理性及安全保障等新需求,这一现状有力地推动以SDN为代表的当代网络架构的发展。然而随着学术界与产业界对SDN技术的研究及其设备的普及,安全问题逐渐成为制约其进一步发展的关键因素之一。针对SDN架构的技术发展背景进行分析,然后简析SDN技术的核心架构原理及目前的发展现状;结合SDN架构特点,针对其安全特性及其所面临的安全威胁进行详细分析,并深入讨论SDN网络安全研究的范畴与新兴发展方向。  相似文献   

20.
信息物理系统(CPS)是一个集成计算、通信和物理过程的混成系统,在智慧城市中占据至关重要的地位,其安全问题面临许多挑战.本文首先建立信息物理系统安全威胁分析模型,给出CPS各个组成部件的安全威胁,然后提出了信息物理系统的威胁关联分析方法,并以智能电网为例给出实验测试结果.结果表明,该方法能实现快速大规模安全威胁建模和自动化分析,为智慧城市中的关键信息基础设施提供技术支撑.最后,本文总结了智慧城市中信息物理系统的安全威胁研究进展和未来研究方向.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号