Hierarchical protection mechanism of network information based on computer security model algorithm terminal

被引:0
|
作者
Peng, Yue [1 ]
Limin, Zhao [1 ]
机构
[1] College of Management, Xinxiang Medical University, Xinxiang, Henan,453003, China
来源
关键词
Computer terminals - Network security - Computer networks - Security systems;
D O I
暂无
中图分类号
学科分类号
摘要
With the continuous development of computer communication technology, people's life, work and other aspects have undergone major changes, and have become more and more dependent on the network information. At the same time as the network information continues to increase, the increasing demand for its security has become the focus of its research. Therefore, the research and implementation of hierarchical protection mechanism for network information based on computer security model algorithm terminal was proposed. Through the construction of the computer security model, the computer terminal network information was hierarchized and protected. The experimental results show that the protection mechanism can effectively classify the network information and effectively protect the network information. © 2017 Institute of Thermomechanics CAS, v.v.i.
引用
收藏
页码:341 / 350
相关论文
共 50 条
  • [1] The Strategy of Computer Network Information Security and Protection
    Long, Teng
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 31 - 35
  • [2] Computer Network Information Security and Protection Measures
    Meng, Qingbao
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, COMPUTER AND EDUCATION INFORMATIONIZATION (MCEI 2017), 2017, 75 : 903 - 905
  • [3] Research on computer network security protection technology based on a superiority algorithm
    Wang Z.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01):
  • [4] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [5] Analysis of Computer Network Information Security and Protection Strategy
    Ming, Xiaobo
    Chen, Ying
    Guo, Jinhua
    2018 2ND AASRI INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISC 2018), 2019, 267
  • [6] Analysis of computer network information security and protection strategy
    Yu, Wenye
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT-16), 2016, 59 : 1239 - 1242
  • [7] Study on Security and Protection Strategy of Computer Network Information
    Zhang, Chenxiang
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 74 - 77
  • [8] Research of Computer Network Information Security and Protection Strategy
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2162 - +
  • [9] The Security and Protection Strategy Study of Computer Network Information
    Shi, Junyan
    Li, Juanjuan
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 34 - 37
  • [10] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)