The survey of information system security classified protection

被引:0
|
作者
Tian, Zhihong [1 ]
Wang, Bailing [1 ]
Ye, Zhiwei [1 ]
Zhang, Hongli [1 ]
机构
[1] Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology Haerbin, Heilongjiang Province, China
关键词
Information use - Information systems;
D O I
暂无
中图分类号
学科分类号
摘要
Information security has become very important in most organizations. The state has carried out classified protection system to safeguard the information system. This article discussed the classified protection of information security criteria and technological essentials in the implementation for classified security protection. © Springer-Verlag Berlin Heidelberg 2011.
引用
收藏
页码:975 / 980
相关论文
共 50 条
  • [41] Information security and data protection
    Qureshi, AA
    Siegel, JG
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2001, 14 (1-3) : 1 - 16
  • [42] Challenges in Information Security Protection
    Pereira, Teresa
    Santos, Henrique
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 160 - 166
  • [43] Security Middleware Framework of Classified Application System
    Tao, Yizheng
    Li, Xinglan
    Gao, Shan
    Li, Gongliang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 115 - 118
  • [44] A Survey on Contemporary Security threats in Big Data and Information System
    Jaiswal, Jitendra Kumar
    Samikannu, Rita
    Paramasivam, Ilango
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 263 - 268
  • [45] The Idea of Effectively Building the Next Generation of Information Security Protection System
    Wu, Ying
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 338 - 341
  • [46] IS professionals' information security behaviors in Chinese IT organizations for information security protection
    Ma, Xiaofen
    INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (01)
  • [47] Research on the Security Protection Mechanism of Computer File Management Information System
    Li, Bowei
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT 2017), 2017, 101 : 1006 - 1009
  • [48] Context information-based cyber security defense of protection system
    Sheng, Su
    Chan, W. L.
    Li, K. K.
    Duan Xianzhong
    Zeng Xiangjun
    IEEE TRANSACTIONS ON POWER DELIVERY, 2007, 22 (03) : 1477 - 1481
  • [49] Network Information Security Privacy Protection System in Big Data Era
    Ma, Lei
    Kang, Ying-jian
    Liu, Jian-ping
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT I, 2019, 301 : 65 - 73
  • [50] Design of database security system for information protection in distributed computing environment
    Shin, MH
    Park, KW
    Kim, PK
    Bae, SH
    Ryuichi, Y
    PDPTA'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, 2001, : 1688 - 1694