Hierarchical protection mechanism of network information based on computer security model algorithm terminal

被引:0
|
作者
Peng, Yue [1 ]
Limin, Zhao [1 ]
机构
[1] College of Management, Xinxiang Medical University, Xinxiang, Henan,453003, China
来源
Acta Technica CSAV (Ceskoslovensk Akademie Ved) | 2017年 / 62卷 / 02期
关键词
Computer terminals - Network security - Computer networks - Security systems;
D O I
暂无
中图分类号
学科分类号
摘要
With the continuous development of computer communication technology, people's life, work and other aspects have undergone major changes, and have become more and more dependent on the network information. At the same time as the network information continues to increase, the increasing demand for its security has become the focus of its research. Therefore, the research and implementation of hierarchical protection mechanism for network information based on computer security model algorithm terminal was proposed. Through the construction of the computer security model, the computer terminal network information was hierarchized and protected. The experimental results show that the protection mechanism can effectively classify the network information and effectively protect the network information. © 2017 Institute of Thermomechanics CAS, v.v.i.
引用
收藏
页码:341 / 350
相关论文
共 50 条
  • [41] Discussion on the Protection and Problem of Computer Network Security
    Wan, Biao
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE, 2016, 49 : 344 - 347
  • [42] Analysis and Protection of Computer Network Security Issues
    Ju Jinquan
    Al-Absi, Mohammed Abdulhakim
    Al-Absi, Ahmed Abdulhakim
    Lee, Hoon Jae
    2020 22ND INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): DIGITAL SECURITY GLOBAL AGENDA FOR SAFE SOCIETY!, 2020, : 577 - 580
  • [43] Security Protection Strategies of Computer Communication Network
    Sun, Jiangyan
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1293 - 1297
  • [44] The Research of Computer Network Security and Protection Strategy
    He, Jian
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [45] Computer network information security and its protection strategy from the perspective of educational psychology
    Qiu, Debang
    INTERNATIONAL JOURNAL OF MENTAL HEALTH NURSING, 2024, 33 : 25 - 25
  • [46] Improved Bamboo Algorithm based on Hierarchical Network Model
    Tian, Zengming
    Wen, Xiangming
    Sun, Yong
    Zheng, Wei
    Cheng, Yinbo
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I, 2009, : 297 - 300
  • [47] Computer network security evaluation simulation model based on neural network
    Tang, Ying
    Elhoseny, Mohamed
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (03) : 3197 - 3204
  • [48] Network Information Security Data Protection Based on Data Encryption Technology
    Ping, Han
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (03) : 2719 - 2729
  • [49] Research on the personal privacy information protection problem based on computer security technology
    Zhong, Shuangxi
    Zhang, Min
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 917 - 923
  • [50] Network Information Security Data Protection Based on Data Encryption Technology
    Han Ping
    Wireless Personal Communications, 2022, 126 : 2719 - 2729