首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
面向网络管理的移动主体安全设施   总被引:7,自引:0,他引:7  
杨博  杨鲲  刘大有 《软件学报》2003,14(10):1761-1767
移动主体技术为网络管理提供了一种新方法,但同时也带来了一些不安全因素.全面分析了采用策略与移动主体技术进行网络管理所面临的各种安全问题和相应的解决方案,提出了面向网络管理的移动主体安全设施MASF(mobile Agent security facility).MASF无缝集成了存储保护、加密、鉴别、完整.陛验证、授权、访问控制、安全日志等安全机制.基于MASF开发了一个实际的域间虚拟专用网络管理系统,应用表明,MASF能较好地满足网络管理的安全需求.  相似文献   

2.
本文从分析光明食品(集团)有限公司资金管理现状出发,阐述了集团资金管理信息系统开发的必要性,开发了基于CA安全认证、银企直联平台和.NET技术的资金管理系统,实现了应用资金管理信息系统所带来的经济效益。  相似文献   

3.
《计算机与网络》2005,(10):34-34
虽然使用门户技术来管理日益扩展的Web应用已经成为普遍趋势,但技术经理们却经常忽视这样一个需求,即所有的核心功能如内容管理、搜索、安全等等.都需要扩展到所有的Web应用中去。因此.许多公司常常满足于一些仅能很好支持少量本地功能的门户应用。但是,整个门户不能提供一个全面的管理框架,也不能帮助您降低开发和维护的成本。  相似文献   

4.
Web服务技术给开发基于Web的应用带来了新的机遇和效益,但系统安全性却不利于其应用性。本文通过扩展Web服务安全规范实现了一种支持可信服务的机制.提出了电子商务和电子政务中Web服务安全性的实际解决方案。  相似文献   

5.
《计算机与网络》2010,(23):34-35
随着IT技术的发展与普及,企业及政府等相关部门信息化程度的逐渐加快,越来越的多应用被部署到我们的信息系统中,随之而来的安全风险也逐渐增加。为了实现信息系统的安全.安全界设计了多种多样的安全模型并开发了相应的技术。本文从Beu—Lapadula和Biba两个模型出发,设计了一个改进的安全模型——SSR模型,对此模型进行了扩充并将其应用到一些实际案例中。  相似文献   

6.
针对传统信息系统不足.提出引入工作流技术的解决方案。在阐述了工作流技术概念及其参考模型的基础上,遵循工作流管理联盟参考模型,采用基于J2EE的三层体系,开发出了一种交互式的工作流管理平台。重点介绍了基于J2EE架构的体系框架.并结合具体业务研究了工作流技术在油田信息系统开发上的应用.探讨了利用角色权限和数字签名解决工怍流技术网上应用的安全问题。  相似文献   

7.
林晓蓝 《A&S》2005,(12):116-120
薄利多销的零售业除了要面对激烈的竞争,还要承受商品损耗与安全带来的损失,目前,一些防损技术已应用在零售连锁店,在零售连锁店安全管理中扮演着重要角色。[编者按]  相似文献   

8.
米强 《物联网技术》2013,(11):70-71,74
电子信息技术的迅猛发展,为信息流通带来了极大便利。电子信息技术以其方便、快捷的特点,已深入到企业管理的各个方面。但就目前的情况来看,电子信息技术的高速发展为企业信息安全管理带来了一些困难。基于此,本文以企业信息安全管理存在的问题为切入点,对电子信息枝术在企业安全管理中的应用进行了深入探讨,以期为强化我国企业信息安全管理提供一些参考和借鉴。  相似文献   

9.
首先提出在web应用开发中会面临的一些基本安全问题,及相应的解决措施。然后对基于ASP.NET开发环境下面临的一些安全问题.给出具体的解决方案。  相似文献   

10.
主要总结了一些流行的观点和前沿研究结果,在综合技术、文化、管理和组织等方面综合因素的基础上,提出了流程导向的新产品开发知识管理应用模型,阐述了流程导向的新产品开发知识管理内涵,并以汽车新产品开发为例对其进行了说明。  相似文献   

11.
Liu  S. Silverman  M. 《IT Professional》2001,3(1):27-32
As organizations search for more secure authentication methods for user access, e-commerce. and other security applications, biometrics is gaining increasing attention. But should your company use biometrics? And, if so, which ones should you use and how do you choose them? There is no one best biometric technology. Different applications require different biometrics. To select the right biometric for your situation, you will need to navigate through some complex vendor products and keep an eye on future developments in technology and standards. Your options have never been more diverse. After years of research and development, vendors now have several products to offer. Some are relatively immature, having only recently become commercially available, but even these can substantially improve your company's information security posture. We briefly describe some emerging biometric technologies to help guide your decision making  相似文献   

12.
There's an old joke that computers are actually easy machines to secure: just turn them off, lock them in a metal-lined room, and throw away the key. What you end up with is a machine that is very secure--just not very usable.As the joke's continuing popularity demonstrates, many people believe that there is an inherent trade-off between security and usability. A computer without passwords is usable, but not very secure. On the other hand, a computer that requires you to authenticate every 5 minutes with your password and a fresh drop of blood might indeed be very secure, but nobody would want to use it.  相似文献   

13.
The supply chain for distributing digital goods via the Internet is in the process of spasmodic change. A wide array of new, high-speed access technologies are transforming the last mile, eroding the market power of established access providers, making smaller companies disappear overnight, and generating huge alliances. Customers face a rich set of options in access and content. The many access options and speeds have been accompanied by increasingly innovative digital products and services, most of them personalized. Wireless is maturing as a medium for data distribution with exciting new applications. While most observers recognize that the industries of content and access provision are in flux, it is unclear which business models may survive. The savvy organization (and individual) need to correctly interpret the implications of the dazzling developments in technology to effectively position themselves in the market. The authors characterize scenarios that are likely to occur based on the premise that you can't think of content and access provision as separate markets. Value-added bundles of dynamically customized content will be the order of the day. Will you and your organization be ready for the change?  相似文献   

14.
How can you tell if an IT security product (or a product that includes security components) can secure your application? How can you be certain that a product will fully deliver on its claims that it will protect against malice in a deployed environment? Unfortunately, few vendors - and even fewer customers - can make these judgments. The article won't make you a security wizard, but it will give you a feel for what to look for in, and when to be concerned about, a vendor's claims. To ensure that a product has a chance of being secure; customers should check that vendors use adequate approaches in four primary areas. In order of importance (and maturity and availability), they are: quality-control (QC) mechanisms; cryptographic primitives; hardware assist mechanisms; and separation mechanisms.  相似文献   

15.
Biometrics technology has come a long way from simpler forms of systems security. But are biometrics-based systems more secure or do they simply require crackers to become more proficient at breaking into systems? To recognize your fingerprint requires that a template of your fingerprint actually be present in the system that verifies your access. If you want to pass as somebody else, presumably you'd have to either have that person's finger with you or you'd need to change the verifying template residing in the system that verifies your print. Cracking into a system and replacing a legitimate print with your own isn't easy to do unless the system's security is poor. While biometric proponents stress the strength of their proprietary technologies or biometrics in general, no system is ever completely secure. Contrary to what many biometric proponents would have us believe-that biometric security outclasses traditional forms of security-all biometric systems are, after all, another form of computer security with its own set of strengths and weaknesses. Biometrics effectively trade some amount of privacy and cost effectiveness for ultimate convenience-and these systems are certainly no less secure than standard password systems. Password systems are cheap. Complex biometric scanning equipment is usually expensive. But biometrics seems to be where the industry is headed.  相似文献   

16.
The Common Criteria for Information Technology Security Evaluation standard (CC) promises to replace scattered and often conflicting regional and national security standards. An emerging international standard, it is intended to support developers, evaluators and consumers of security products. The CC provides a framework to rate products by evaluation assurance level (EAL). Each EAL embodies a recommended set of assurance requirements: the higher the EAL, the more secure the product. You can use EALs to pick and choose which assurance requirements you want to satisfy. Think of the EALs as you would think of bandwidth or processor speed. Not everyone in your organization needs a dedicated T3 line or a 450 MHz desktop. Likewise, not every security product you use needs an EAL7 rating. The article shows how you, as a security products consumer, can use the CC to help determine if a given product meets your security needs. By rating different products according to their EALs, the CC can help you comparison shop and select an appropriately secure product. Further, the standard's international scope can help you integrate your system's security components with those in other countries-whether those components belong to customers, vendors, or other divisions of your own enterprise  相似文献   

17.
Abstract

Imagine you are an information security manager and your boss is asking: “How secure are our information systems? Is the security getting better or worse? How do you know that?” One thing is sure: if you do not have a good answer, your own job may not be secure. You could answer that you are monitoring intrusion attempts and investigating alarms, that you are updating the anti-virus software on a regular basis and applying software patches on a timely basis, but that was not the question. Your boss wants to know not only whatyou have done to lower the risk, but how effective you have been. It is all about process, measurements, and trend monitoring.1  相似文献   

18.
一种Web服务安全通信机制的研究与实现   总被引:7,自引:0,他引:7  
随着Web服务技术与应用的发展,Web服务安全问题日益突出。Web服务安全通信要求保证应用层SOAP消息的安全传输,而现有的安全传输方案,如SSL,TLS等不适用于应用层的消息安全保护,无法满足上述要求。针对Web服务应用模式,提出了一种基于XML安全技术的Web服务安全通信机制,利用安全会话实现了较高的实体认证安全性和安全通信效率,并为此设计和实现了保证应用层SOAP消息安全传输的SOAPSec系统。该机制具有灵活性和可扩展性,可满足典型Web服务应用场景下的安全通信需求。  相似文献   

19.
Internet computing, harnessing global communication to increase computational power, is now possible. But will it ever truly be secure? Researchers have proposed various schemes to transform the Internet into the “Interputer”. Several companies are creating applications, tools, and protocols to harvest cycles from idling CPUs around the world, while compensating their obviously industrious users with offline and online gifts. Although the potential benefits of a universally accessible Interputer are undoubtedly extensive, a fundamental problem lurks backstage: How can you guarantee the accuracy of the results you receive from a remote computing node, which has just purportedly run the program you sent it? The article examines this question and suggests an answer involving cryptography  相似文献   

20.
Chou  W. Chang  J.M. Wu  S. 《IT Professional》2008,10(5):12-14
In this paper wireless technologies continue to advance to provide faster, more reliable, and more secure service. The articles in this issue provide case studies and practical information to help the IT professional understand existing wireless broadband options as well as their future direction.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号