The survey of information system security classified protection

被引:0
|
作者
Tian, Zhihong [1 ]
Wang, Bailing [1 ]
Ye, Zhiwei [1 ]
Zhang, Hongli [1 ]
机构
[1] Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology Haerbin, Heilongjiang Province, China
关键词
Information use - Information systems;
D O I
暂无
中图分类号
学科分类号
摘要
Information security has become very important in most organizations. The state has carried out classified protection system to safeguard the information system. This article discussed the classified protection of information security criteria and technological essentials in the implementation for classified security protection. © Springer-Verlag Berlin Heidelberg 2011.
引用
收藏
页码:975 / 980
相关论文
共 50 条
  • [21] Seamless Classified Information Protection Capability
    Ganapathy, Subhashini
    Amirfathi, Michael
    Layton, Ken
    Saadia, Acosta
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS, 2008, : 712 - +
  • [22] A evaluation method for classified security protection of information systems based on neural network and rough set
    Fang, Zhou
    Wang, Xizhong
    Qu, Jiaxing
    Ma, Chao
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 8 - 10
  • [23] Constructing a Security System for Classified Computer Information Using Distributed Parallel Computing
    Wang, Leng
    Yang, Li
    Mobile Information Systems, 2022, 2022
  • [24] Constructing a Security System for Classified Computer Information Using Distributed Parallel Computing
    Wang, Leng
    Yang, Li
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [25] On Legal Effects of Coming into Force of the Amendment to the Act on Protection of Classified Information on the System of Protection of Information Comprised of State Secrets
    Odrowaz-Sypniewski, Wojciech
    Radziewicz, Piotr
    PRZEGLAD SEJMOWY, 2005, (05): : 141 - 152
  • [26] Optical security system for the protection of personal identification information
    Doh, YH
    Yoon, JS
    Choi, KH
    Alam, MS
    APPLIED OPTICS, 2005, 44 (05) : 742 - 750
  • [27] Edge Computing Security Protection from the Perspective of Classified protection of Cybersecurity
    Wu, Wei
    Zhang, Qi
    Wang, Hui Juan
    2019 6TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2019), 2019, : 278 - 281
  • [28] Compliance analysis of business information system under classified protection 2.0 of cybersecurity
    Jiang, Xin
    Ding, Yanqing
    Ma, Xiudan
    Li, Xumao
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 87 - 93
  • [29] Research on the Classified Protection Model of Information System Based on the Threat Intelligence Technologies
    Tao, Yuan
    Fan, Ke
    Guo, Feng-ming
    Li, Mo-yan
    INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
  • [30] The Personal Information Privacy Protection Strategy in Social Security Information System
    Wang, Xuefang
    Xue, Hongrong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 718 - +