Hierarchical protection mechanism of network information based on computer security model algorithm terminal

被引:0
|
作者
Peng, Yue [1 ]
Limin, Zhao [1 ]
机构
[1] College of Management, Xinxiang Medical University, Xinxiang, Henan,453003, China
来源
Acta Technica CSAV (Ceskoslovensk Akademie Ved) | 2017年 / 62卷 / 02期
关键词
Computer terminals - Network security - Computer networks - Security systems;
D O I
暂无
中图分类号
学科分类号
摘要
With the continuous development of computer communication technology, people's life, work and other aspects have undergone major changes, and have become more and more dependent on the network information. At the same time as the network information continues to increase, the increasing demand for its security has become the focus of its research. Therefore, the research and implementation of hierarchical protection mechanism for network information based on computer security model algorithm terminal was proposed. Through the construction of the computer security model, the computer terminal network information was hierarchized and protected. The experimental results show that the protection mechanism can effectively classify the network information and effectively protect the network information. © 2017 Institute of Thermomechanics CAS, v.v.i.
引用
收藏
页码:341 / 350
相关论文
共 50 条
  • [21] Secret information security system in computer network based on Bayesian classification and nonlinear algorithm
    Wu, Hao
    NONLINEAR ENGINEERING - MODELING AND APPLICATION, 2022, 11 (01): : 620 - 628
  • [22] Evaluation Model for Computer Network Information Security Based on Analytic Hierarchy Process
    Xi Zhen-yuan
    Chen He
    Wang Xiang-zhong
    Sheng Jian-ling
    Fan Yu-tao
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 186 - 189
  • [23] Security protection of computer network information under the background of big data
    Yang, Wenbin
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 127 : 202 - 202
  • [24] Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things
    Wang, Qi
    Li, Ling
    Hu, Shuai
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [25] Computer Network Security Evaluation Based on Intelligent Algorithm
    Sun Ming
    2017 SIXTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGIES (FGCT), 2017, : 88 - 91
  • [26] Network model and topology control algorithm based on hierarchical autonomous system in space information network
    Zhang W.
    Zhang G.-X.
    Bian D.-M.
    Gou L.
    Xie Z.-D.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (06): : 94 - 105
  • [27] Computer network security and information security technology optimization by using Bayesian classification algorithm
    Fu, Rui
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [28] Computer Network Security Threats and Treatment Measures Based on Host Security Protection
    Jiang, Jianfeng
    Journal of Physics: Conference Series, 2021, 1992 (03)
  • [29] Research on Computer Network Security and Protection
    Liang, Tiantian
    2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 29, 2014, 29 : 244 - 247
  • [30] Comprehensive evaluation model for computer network security with linguistic information
    Li Y.
    Shan X.
    Wu G.
    Advances in Information Sciences and Service Sciences, 2011, 3 (09): : 126 - 131