The semantic model based on BSCM for the information security

被引:0
|
作者
Zhong, Liu [1 ]
机构
[1] Guiling Univ Technol, Ctr Technol Modern Educ, Guilin 541004, Guangxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Semanteme identifying is very difficult problem in the information security. But if the semantic models have been set up for the mechanism of the information security, that's the easy way to identify the semanteme. A few semantic models have been set up based on the BSCM. These models should be defined the basic semanteme unit and be defined the models of the semantic relativity. The content of information could be judged by these models. The most basic semantic unit should be defined as BSCM. Basing on the BSCM, the model of the relativity of semanteme for the relativity of semanteme has been set up.
引用
收藏
页码:497 / 501
页数:5
相关论文
共 50 条
  • [31] Research on Assessment Model of Information System Security Based on Various Security Factors
    林梦泉
    朱赟
    王强民
    李建华
    JournalofShanghaiJiaotongUniversity, 2007, (03) : 405 - 409
  • [32] An enhanced smartphone security model based on information security management system (ISMS)
    Jong Hyuk Park
    Ki Jung Yi
    Young-Sik Jeong
    Electronic Commerce Research, 2014, 14 : 321 - 348
  • [33] An enhanced smartphone security model based on information security management system (ISMS)
    Park, Jong Hyuk
    Yi, Ki Jung
    Jeong, Young-Sik
    ELECTRONIC COMMERCE RESEARCH, 2014, 14 (03) : 321 - 348
  • [34] Information system in security area using semantic approach
    Buřita, Ladislav
    Ondryhal, Vojtěch
    Frontiers in Artificial Intelligence and Applications, 2009, 190 (01) : 331 - 339
  • [35] A Semantic Knowledge Base Construction Method for Information Security
    Yao, Yuangang
    Ma, Xiaoyu
    Liu, Hui
    Yi, Jin
    Zhao, Xianghui
    Liu, Lin
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 803 - 808
  • [36] Research on Information Security Audit Base on Semantic Web Ontology and Improve Vector Space Model
    Wang, Zhanjiang
    Wang, Shuoning
    Wang, Ling
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 141 - 151
  • [37] Importance of Semantic Information Based on Semantic Value
    Gao, Shang
    Qin, Xiaoqi
    Chen, Li
    Chen, Yunfei
    Han, Kaifeng
    Zhang, Ping
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (09) : 5443 - 5457
  • [38] A model-based approach to semantic-based retrieval of visual information
    Golshani, F
    Park, Y
    Panchanathan, S
    SOFSEM 2002: THEORY AND PRACTICE OF INFORMATICS, 2002, 2540 : 149 - 167
  • [39] The security model to combine the corporate and information security
    Virtanen, T
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 305 - 316
  • [40] Network Information Security Model Based on Web Data Mining
    Lingam, M. Shankar
    Kumar, A. Arun
    Sudhakara, A. M.
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 51 - 56