首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
李恬  张红 《包装工程》2000,21(4):35-38
分析了包装行业企业信息处理现状,阐述了Internet/Intranet的功能和特点,以及Internet/Intranet在包装杆业的应用领域,分析了企业建立Internet/Intranet网络方案的选择方法;提出了纸包装企业Internet/Intranet建设方案。  相似文献   

2.
基于Internet/Intranet的质量信息系统重构技术研究   总被引:3,自引:0,他引:3  
研究了基于web浏览器的质量信息系统运行方式和质量信息系统的重构分类方法,在此基础上,提出了基于Internet/Intranet质量信息系统的结构框架和重构流程,以此来映射和完成基于Internet/Intranet的质量信息系统的功能,以适应敏捷制造中动态联盟的结构变化性和快速响应的要求。  相似文献   

3.
本文介绍了人民法院计算机信息网络系统的建设和实施方案。提供建设规范和方案选型,作为Internet/Intranet网络系统应用到系统集成的经验和成果。包括方案论证、系统实施、网络选型、安全措施等。  相似文献   

4.
基于环球网的CAD/CAM技术   总被引:1,自引:0,他引:1  
提出了开发基于Internet(中文意为环球网)的CAD/CAM系统的思想,并利用Ineternet中应用最普遍的WWW服务中的上应网关接口成功地开发了基于Internet的CAD/CAM系统。  相似文献   

5.
随着国家认证认可条例的颁布和实施,认证检测成为空调器进入市场必经的第一道关卡。空调器的认证检测主要包括安全认证、能效认证和性能认证这几个方面的内容,其中安全认证主要以IEC/EN60335-2-40/UL484/UL1995为认证标准,本文主要阐述了空调认证的认证内容及重要性,分析了空调器产品安全认证检测中常见的问题,包括产品标志、机械安全、电气安全等方面存在的问题及产品其他方面的问题,并针对这些问题简要提出相应的解决对策,以期为空调器的认证检测提供参考和意见。  相似文献   

6.
澳大利亚认证工作通用标准委员会IT/12/4/1将要发布一个新版的修订标准:《信息技术———认证工作通用标准 第2-1部分 认证工作主体框架》。本标准主要目的是为了保证认证机构基本运作要求、技术能力、认证程序安排以及安全保证方面的一致性。标准还给出了为达到不同程度保证能力所需进行的认证范围和内容,所要达到的信任程度越高,则需要进行评定的范围越广。认证工作通用标准  相似文献   

7.
中国质量认证信息网正式开通1997年8月28日,中国标准化协会、中国技术监督情报研究所在京联合召开新闻发布会。大会宣布:“中国质量认证信息网”已出现在全球计算机互联网(Internet)上,正式向世界开通。因此,中国质量认证工作踏上了信息高速公路。“...  相似文献   

8.
白洁 《中国科技博览》2014,(28):271-271
随着我国科学技术的不断发展和网络信息技术的不断成熟,基于数字化的身份认证系统在各个领域被广泛的运用。身份认证系统在企业的信息管理和信息安全中发挥着重要作用,对于能源企业来说,因为其企业的特殊性,对于内部信息的安全要求程度更高,建立一套性能良好,稳定可靠的身份认证系统显得至关重要。本文就身份认证系统的特点进行了阐述,并分析了身份认证系统在应用过程中容易出现的问题,提出了身份认证系统在能源企业中的应用措施。  相似文献   

9.
陈志昊 《硅谷》2010,(24):72-73
阐述将S/MIME安全机制和HTTP摘要认证进行结合,从而提高SIP通讯安全的设想,该构想的实现可极大的提高多媒体通讯安全。  相似文献   

10.
介绍了基于实例的敏捷制造信息系统结构。结合Interet/Intranet和人工技术,提出了基于智能代理机制的信息系统实现方案。系统采用VRML虚拟现实技术实现信息跨平台浏览共享,并讨论了基于成本和敏捷度的新产品设计优化方法。  相似文献   

11.
本文阐述了信息安全标准化战略的实施对社会发展的推进作用.通过分析湖北省信息安全与标准化战略的关系,初步探讨湖北信息安全的标准化体系建立与战略实施.旨在利用标准化手段促进湖北省信息安全与社会同步发展.  相似文献   

12.
Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information, but also the expansion of areas and assets to be protected. In terms of information security, it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets. Also, it has caused difficulties in managing those issues due to reasons such as mutual interference, countless security events and logs’ data, etc. Within this security environment, an organization should identify and classify assets based on the value of data and their security perspective, and then apply appropriate protection measures according to the assets’ security classification for effective security management. But there are still difficulties stemming from the need to manage numerous security solutions in order to protect the classified assets. In this paper, we propose an information classification management service based on blockchain, which presents and uses a model of the value of data and the security perspective. It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain. The proposed service reduces assets to be protected and security solutions to be applied, and provides security measures at the platform level rather than individual security solutions, by using blockchain. In the rapidly changing security environment of Industry 4.0, this proposed service enables economic security, provides a new integrated security platform, and demonstrates service value.  相似文献   

13.
本文结合ISO/IEC27001-2013新版标准,在信息安全管理体系国家标准即将正式颁布之前,将2013版对照2005版予以解析,以期加深对新版信息安全管理体系标准的理解,从而提出在信息安全管理换版方面的重点建议。  相似文献   

14.
电子信息产业是我国经济最具活力和创新的产业,本文在深刻剖析我国电子信息产业安全面临的严峻形势的基础上,深入研究了标准化对我国电子信息产业安全的影响机理,为提升我国电子信息产业安全的保障能力,提供了扎实的理论基础.  相似文献   

15.
In consideration of business information sharing, this paper investigates a new game of information sharing and security investment between two allied firms. Firms’ strategies in three decision models (Nash Equilibrium decision, partially centralised decision and totally centralised decision) are analysed. We provide some quantitative analyses on how some parameters affect firms’ decisions in the three decision models. Our Nash Equilibrium analysis shows that when firms make decisions individually, they will share no information with each other. When information sharing is determined by a social planner, firms will share some information with each other, which increases the risk of information leakage. Thus, firms should increase their security investments to mitigate the higher information leakage risk. However, our analysis shows that instead of investing more in information security, firms will reduce their security investment, which will further aggravate the risk. Hence, a social planner is required to designate the security investments and information sharing levels for both firms. Our theoretical analysis shows that firms’ strategies can achieve global optimality in the totally centralised decision model. Furthermore, a numerical experiment is conducted and the result demonstrates that totally centralised decision model is more efficient than the other two decision models. At last, we propose two compensation mechanisms to help firms coordinate their strategies when making decisions individually.  相似文献   

16.
The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliable services focused on security internalization, it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment information in medical artificial intelligence. We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to overcome such threats. We verified the proposed countermeasures through a survey of experts. Security requirements were defined based on the information life cycle in the medical convergence environment. We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.  相似文献   

17.
Over the last decade, a significant increase has been observed in the use of web-based Information systems that process sensitive information, e.g., personal, financial, medical. With this increased use, the security of such systems became a crucial aspect to ensure safety, integrity and authenticity of the data. To achieve the objectives of data safety, security testing is performed. However, with growth and diversity of information systems, it is challenging to apply security testing for each and every system. Therefore, it is important to classify the assets based on their required level of security using an appropriate technique. In this paper, we propose an asset security classification technique to classify the System Under Test (SUT) based on various factors such as system exposure, data criticality and security requirements. We perform an extensive evaluation of our technique on a sample of 451 information systems. Further, we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities. Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.  相似文献   

18.
标准化在维护我国电子信息产业安全方面发挥着至关重要的作用.本文深入分析了标准化在保障我国电子信息产业安全中存在的主要问题,提出了实施标准化战略确保我国电子信息产业安全的切实可行的政策措施.  相似文献   

19.
The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven secondary indicators of system protection rate, attack detection rate, confidentiality, availability, controllability, identifiability, number of vulnerabilities, vulnerability hazard level, staff organization, enterprise grading and service continuity, respectively. Then, we build the core algorithm to enable the evaluation model, wherein a novel weighting technique is developed and a quantitative method is proposed to measure the S&R value. Moreover, in order to better supervise the performance of the proposed evaluation model, we present four novel indicators includes residual risk, continuous conformity of residual risk, head-to-tail consistency and decrease ratio, respectively. Simulation results show the advantages of the proposed model in the evaluation of information security for IoT.  相似文献   

20.
The paper presents an improved e-learner model that supports monitoring of user behavior related to information security. The model is built upon standardized IMS specification, according to literature research and survey conducted among e-learners. It is positioned as key part of an extended LTSA architecture in which the learner data is used to improve learner security position by continuous delivery of important information and adapting security mechanisms. The implementation is considered in Moodle LMS.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号