Survey on cyberspace security

被引:56
|
作者
Zhang HuanGuo [1 ]
Han WenBao [2 ]
Lai XueJia [3 ]
Lin DongDai [4 ]
Ma JianFeng [5 ]
Li JianHua [6 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Wuxi 214122, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Comp, Shanghai 200240, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[5] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[6] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
cyberspace security; information security; cryptography; network security; information system security; information content security; FULLY HOMOMORPHIC ENCRYPTION; STREAM CIPHERS; ATTACKS; RETRIEVAL; CLASSIFICATION; CRYPTOSYSTEMS; ANONYMITY; CLOUD; MODEL;
D O I
10.1007/s11432-015-5433-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace. This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself, cyberspace security, cryptography, network security, information system security and information content security.
引用
收藏
页码:1 / 43
页数:43
相关论文
共 50 条
  • [31] Survey of the Law of Cyberspace: Introduction
    Fleming, Michael F.
    Dorrain, Kristine F.
    BUSINESS LAWYER, 2010, 66 (01): : 155 - 158
  • [32] A Survey of Patent Law in Cyberspace
    Nguyen, Phong D.
    BUSINESS LAWYER, 2010, 66 (01): : 197 - 203
  • [33] Survey of the law of cyberspace: Introduction
    Moringiello, JM
    BUSINESS LAWYER, 2005, 61 (01): : 431 - 432
  • [34] Survey of the law of cyberspace: Introduction
    McGuire, MJ
    BUSINESS LAWYER, 2004, 60 (01): : 395 - 396
  • [35] An analysis on the security perception of Italian cyberspace
    Chiappetta, Federica
    Fadlon, Leslie
    Pala, Arianna Norcini
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 212 - 218
  • [36] Statistical Techniques for Assessing Cyberspace Security
    Kammerdiner, Alla R.
    DYNAMICS OF INFORMATION SYSTEMS: COMPUTATIONAL AND MATHEMATICAL CHALLENGES, 2014, 105 : 161 - 177
  • [37] CYBERSPACE SECURITY: FOR A BETTER LIFE AND WORK
    Zhang, Huanguo
    CHINA COMMUNICATIONS, 2018, 15 (02) : III - III
  • [38] Security of Enterprise Information Resources in Cyberspace
    Deren, Aldona
    Seretna-Salamaj, Danuta
    Skonieczny, Jan
    Kondracka, Zofia
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2019, PT III, 2020, 1052 : 262 - 275
  • [39] A Survey of False Advertising in Cyberspace
    Balough, Cheryl Dancey
    BUSINESS LAWYER, 2012, 68 (01): : 297 - 304
  • [40] Survey of the Law of Cyberspace: Introduction
    Rubens, Jonathan T.
    Morse, Edward A.
    BUSINESS LAWYER, 2013, 69 (01): : 183 - 187