Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (5): 1-9.doi: 10.11959/j.issn.2096-109x.2017.00145
• Perspective • Next Articles
De-yu YUAN1,Xiao-juan WANG2,Jian-chao WAN3
Revised:
2017-02-05
Online:
2017-05-01
Published:
2017-05-13
Supported by:
CLC Number:
De-yu YUAN,Xiao-juan WANG,Jian-chao WAN. Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era[J]. Chinese Journal of Network and Information Security, 2017, 3(5): 1-9.
[1] | SCH?NW?LDER J , FOUQUET M , RODOSEK G D ,et al. Future Internet=content + services + management[J]. IEEE Communications Magazine, 2009,47(7): 27-33. |
[2] | 国务院 . 国务院关于积极推进“互联网+”行动的指导意见[J]. 中华人民共和国国务院公报, 2015(20): 20-22. |
State Council of the People’s Republic of China . Opinions of the State Council on actively promoting the "Internet +"action[J]. Bulletin of the State Council of the People’s Republic of China, 2015(20): 20-22. | |
[3] | 工业和信息化部. 工业和信息化部关于印发贯彻落实《国务院关于积极推进“互联网+”行动的指导意见》行动计划(2015-2018年)的通知[Z]. |
Ministry of Industry and Information Technology. Notice on the implementation of the action plan of the State Council on actively promoting the guidance of the “Internet +” action(2015-2018)[Z]. | |
[4] | 王兴伟, 李婕, 谭振华 ,等. 面向“互联网+”的网络技术发展现状与未来趋势[J]. 计算机研究与发展, 2016,53(4): 729-741. |
WANG X W , LI J , TAN Z H ,et al. The current situation and future trend of network technology for “Internet+”[J]. Computer Research and Development, 2016,53(4): 729-741. | |
[5] | 中国互联网络信息中心. 第36次中国互联网络发展状况统计报告[R]. 2015. |
CNNIC. The 36th annual statistics report of China Internet development[R]. 2015. | |
[6] | 中国新闻网. 中国应以军队为主体整合国家网络空间安全力量[EB/OL]. . |
China News Network. China should use the army as the main body to integrate national cyberspace security forces[EB/OL]. . | |
[7] | 李凤华 . 信息技术与网络空间安全发展趋势[J]. 网络与信息安全学报, 2015,1(1): 8-17. |
LI F H . Information technology and network space security development trend[J]. Chinese Journal of Network and Information Security, 2015,1(1): 8-17. | |
[8] | 方滨兴 . 从层次角度看网络空间安全技术的覆盖领域[J]. 网络与信息安全学报, 2015,1(1): 2-7. |
FANG B X . Study on the coverage of cyberspace security technology from the perspective of hierarchy[J]. Chinese Journal of Network and Information Security, 2015,1(1): 2-7. | |
[9] | 丁禹, 逯志安, 焦建伟 . 2014年网络空间安全问题综述与展望[J]. 信息安全与通信保密, 2015(2): 16-21. |
DING Y , LU Z A , JIAO J W . Summary and prospect of cyberspace security in 2014[J]. Information Security and Communication Confidentiality, 2015(2): 16-21. | |
[10] | 李衂 . 维护国家网络空间主权势在必行[J]. 信息安全与通信保密, 2015(8): 27. |
LI N . Maintaining national cyberspace dominance is imperative[J]. Information Security and Communication Confidentiality, 2015(8): 27. | |
[11] | MENDYK-KRAJEWSKA T , MAZUR Z . Problem of network security threats[C]// The 3rd Conference on Human System Interactions. 2010: 436-443. |
[12] | 阿里研究院. 互联网+:从IT到DT[M]. 北京: 机械工业出版社, 2015. |
Alibaba Research Institute. Internet+:from IT to DT[M]. Beijing: Machinery Industry PressPress, 2015. | |
[13] | FURDEK M , WOSINSKA L , GO?CIE? R ,et al. An overview of security challenges in communication networks[C]// Resilient Networks Design and Modeling. 2016. |
[14] | HASHIZUME K , ROSADO D G , FERNáNDEZ-MEDINA E ,et al. An analysis of security issues for cloud computing[J]. Journal of Internet Services and Applications, 2013,4(1): 1-13. |
[15] | 国家计算机网络应急技术处理协调中心. 2014 年中国互联网网络安全报告[M]. 北京: 人民邮电出版社, 2015. |
CNCERT/CC. China Internet network security report 2014[M]. Beijing: Posts and Telecommunications PressPress, 2015. | |
[16] | DRIAS Z , SERHROUCHNI A , VOGEL O . Analysis of cyber security for industrial control systems[C]// The International Conference on Cyber Security of Smart Cities,Industrial Control System and Communications. 2015. |
[17] | 陶耀东, 李宁, 曾广圣 . 工业控制系统安全综述[J]. 计算机工程与应用, 2016,52(13): 8-18. |
TAO Y D , LI N , ZENG G S . Safety of industrial control system[J]. Computer Engineering and Applications, 2016,52(13): 8-18. | |
[18] | 维克托·迈尔-舍恩伯格, 肯尼斯·库克耶 . MPLS宽带网络互联技术[M]. 大数据时代: 浙江人民出版社, 2012: 27-60. |
SMEYER-CHOENBERG V , COOKE K . Big data era[M]. Hangzhou: Zhejiang People 's Publishing HousePress, 2012: 27-60. | |
[19] | 苏鹏冲, 马丁, 袁得嵛 . “互联网+”时代网络安全与执法专业人才培养研究[J]. 中国人民公安大学学报:自然科学版, 2016(1): 79-82. |
SU P C , MA D , YUAN D Y . Research on the training of network security and law enforcement professional talents in Internet plus era[J]. Journal of People’s Public Security University of China:Natural Science Edition, 2016(1): 79-82. | |
[20] | 马明阳 . 针对社会工程学攻击的防御技术研究[D]. 北京:北京邮电大学, 2015. |
MA M Y . Research on defense technology for social engineering attack[D]. Beijing:Beijing University of Posts and Telecommunications, 2015. | |
[21] | ROADS of storage[EB/OL]. . |
[22] | 杨帅 . 工业4.0与工业互联网:比较、启示与应对策略[J]. 当代财经, 2015(8): 99-107. |
YANG S . Industrial 4.0 and industrial Internet:comparison,revelation and coping strategies[J]. Contemporary Finance and Economics, 2015(8): 99-107. | |
[23] | GAN G , LU Z , JIANG J . Internet of things security analysis[C]// The International Conference on Internet Technology and Applications. 2011: 1-4. |
[24] | 郑斌 . 大数据下的数据安全[EB/OL]. . |
ZHENG B . Data security under big data[EB/OL]. . | |
[25] | 杨洁冰 . 自动分层存储技术及其应用[D]. 北京:北京邮电大学, 2011. |
YANG J B . Automatic tiered storage technology and its application[D]. Beijing:Beijing University of Posts and Telecommunications, 2011. | |
[26] | BANDARI G M , CHANDRA N S , KRISHNA V . Secure cloud storage through public auditing and cryptographic primitives[J]. International Journal of Computer Trends &Technology, 2014,15(2): 36-48. |
[27] | YU S , LIU M , DOU W ,et al. Networking for big data:a survey[J]. IEEE Communications Surveys &Tutorials, 2016,99: 1. |
[28] | WANG J , LUO Y , ZHAO Y ,et al. A survey on privacy preserving data mining[C]// The International Workshop on Database Technology &Applications. 2009: 111-114. |
[29] | WU F , XU L , KUMARI S ,et al. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security[J]. Journal of Ambient Intelligence &Humanized Computing, 2016: 1-16. |
[30] | 黄刘生, 田苗苗, 黄河 . 大数据隐私保护密码技术研究综述[J]. 软件学报, 2015,26(4): 945-959. |
HUANG L S , TIAN M M , HUANG H . A survey on big data privacy protection[J]. Journal of Software, 2015,26(4): 945-959. |
[1] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[2] | Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG. Access control relationship prediction method based on GNN dual source learning [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 40-55. |
[3] | Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU. Hardcoded vulnerability detection approach for IoT device firmware [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 98-110. |
[4] | Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU. Strategy of container migration and honeypot deployment based on signal game in cloud environment [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 87-96. |
[5] | Shang LIU, Yinzhang GUO. Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 176-188. |
[6] | Yi ZHANG, Liqin TIAN, Zenan WU, Wenxing WU. Trust evaluation optimization mechanism for cloud user behavior based on FANP [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 175-182. |
[7] | Guyue LI, Aiqun HU. Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 183-189. |
[8] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[9] | Jiashun ZHOU, Na WANG, Xuehui DU. Multi-party efficient audit mechanism for data integrity based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 113-125. |
[10] | Fu XIAO, Haiping HUANG, Sujun HU, Lijuan SUN. Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 1-9. |
[11] | Ying WU,Xuan LI,Biao JIN,Rongrong JIN. Survey on the privacy-preserving content based image retrieval [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 14-28. |
[12] | Jianming ZHU,Hongrui YANG. Data security challenges and countermeasures in financial technology [J]. Chinese Journal of Network and Information Security, 2019, 5(4): 71-79. |
[13] | ZHANG Huanguo,DU Ruiying. Introduction to cyberspace security discipline [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18. |
[14] | XU Tongge,LIU Lianzhong,LIU Jianwei,MAO Jian. Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 19-24. |
[15] | HU Aiqun,LI Guyue,PENG Linning,LI Tao. Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 54-66. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|