The semantic model based on BSCM for the information security

被引:0
|
作者
Zhong, Liu [1 ]
机构
[1] Guiling Univ Technol, Ctr Technol Modern Educ, Guilin 541004, Guangxi, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Semanteme identifying is very difficult problem in the information security. But if the semantic models have been set up for the mechanism of the information security, that's the easy way to identify the semanteme. A few semantic models have been set up based on the BSCM. These models should be defined the basic semanteme unit and be defined the models of the semantic relativity. The content of information could be judged by these models. The most basic semantic unit should be defined as BSCM. Basing on the BSCM, the model of the relativity of semanteme for the relativity of semanteme has been set up.
引用
收藏
页码:497 / 501
页数:5
相关论文
共 50 条
  • [41] Approximate reduced model based on mutual information for security assessment
    Li, Wei
    Fan, Ming-Yu
    Kongzhi yu Juece/Control and Decision, 2010, 25 (09): : 1426 - 1430
  • [42] Outsource or not? An AHP Based Decision Model for Information Security Management
    Jelovcan, Luka
    Mihelic, Anze
    Prislan, Kaja
    ORGANIZACIJA, 2022, 55 (02) : 142 - 159
  • [43] Digital Information Security Sharing System Based On Lineage Model
    Li, Tao
    Liang, YiWen
    Yang, He
    ISIP: 2009 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING, PROCEEDINGS, 2009, : 121 - +
  • [44] Food security information platform model based on internet of things
    Zhang, Lei
    Zhu, Shanhong
    Advance Journal of Food Science and Technology, 2015, 8 (05) : 312 - 315
  • [45] Knowledge Based Model for Holistic Information Security Risk Analysis
    Huang, Jing-Wen
    Ding, Yong-Sheng
    Hu, Zhi-Hua
    Huang, Jing-Wen
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 88 - +
  • [46] Research of Information System Security Risk Management based on Probability Model and Security Entropy
    Du, Jiawei
    Zhou, Ying
    Guo, Ronghua
    Zhang, Xing
    Suo, Guowei
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420
  • [47] A Security Information Flow Model Based On Role and User Group
    Liu, Yi-he
    INTERNATIONAL CONFERENCE ON CONTROL SYSTEM AND AUTOMATION (CSA 2013), 2013, : 406 - 411
  • [48] Evaluating the Network and Information System Security Based on SVM Model
    Yang, Shaomei
    Liu, Donglei
    Liu, Zhibin
    JOURNAL OF COMPUTERS, 2009, 4 (11) : 1145 - 1150
  • [49] Research of Web service security model based on SOAP information
    Pei, Shujun
    Chen, Deyun
    Chu, Yuyuan
    Xu, Qingfeng
    Xi, Shi
    Information Technology Journal, 2012, 11 (02) : 241 - 247
  • [50] The Information Security Risk Assessment Model Based on GA - BP
    Song, Yongqiang
    Shen, Yongjun
    Zhang, Guidong
    Hu, Yuming
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 119 - 122