Journal on Communications ›› 2014, Vol. 35 ›› Issue (Z2): 203-212.doi: 10.3969/j.issn.1000-436x.2014.z2.028
• Papers • Previous Articles Next Articles
Shi-jie YAN1,Le-quan MIN1,Xiu-bin FAN2
Online:
2014-11-25
Published:
2017-06-19
Supported by:
Shi-jie YAN,Le-quan MIN,Xiu-bin FAN. Research on the knowledge security[J]. Journal on Communications, 2014, 35(Z2): 203-212.
[1] | 丁大尉, 李正风 . 网络信息空间中的知识构建—以维基百科知识生成机制为例[J]. 自然辩证法研究, 2012,28(5): 61-65. DING D W , LI Z F . Knowledge construction in nnetwork information world-case study of knowledge production machanism of wikipedia[J]. Studies in Dialectics of Nature, 2012,28(5): 61-65. |
[2] | 陆汝铃 . 世纪之交的知识工程与知识科学[M]. 北京: 清华大学出版社, 2001. LU R L . Knowledge engineering and knowledge science at the turn of the century[M]. Beijing: Tsinghua University Press Press, 2001. |
[3] | 陈文伟, 陈晟 . 知识工程与知识管理[M]. 北京: 清华大学出版社, 2010. CHEN W W , Chen C . Knowledge Engineering and Knowledge Management[M]. Beijing: Tsinghua University PressPress, 2010. |
[4] | DESOUZA K C . Managing Knowledge Security:Strategies for Protecting Your Company’s Intellectual Assets[M]. UK: Kogan Page. |
[5] | 陈雪秀, 吕述望, 孙鹏 . 知识安全与可控性[J]. 信息安全与保密通信, 2004,12(4): 12-16. CHEN X X , LV S W , SUN P . Knowledge security and controllability[J]. China Information Security, 2004,12(4): 12-16. |
[6] | 周雪 . 吕述望教授谈知识安全与未来网络[J]. 信息安全与保密通信, 2012,12(3): 20-22. ZHOU X . Professor Lv Shuwang talks about the knowledge of safety and the future network[J]. China Information Security, 2012,12(3): 20-22. |
[7] | 曾伟忠 . e-Science环境下知识控制研究[D]. 南开大学, 2009. ZENG W Z . Research on Knowledge Control Under e-Science EnviRonment[D]. Nankai University, 2009. |
[8] | 冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-259. FENG D G , ZHANG M , LI H . Big data security and privacy protection[J]. Chinese Journal of Computers, 2014,37(1): 246-259. |
[9] | 刘婷婷 . 面向云计算的数据安全保护关键技术研究[D]. 郑州:信息工程大学, 2013. LIU T T . Research on Key Technologies of Data Security towards Cloud Computing[D]. Zhengzhou:PLA Information Engineering University, 2013. |
[10] | 严慰敏, 吴伟民 . 数据结构[M]. 北京: 清华大学出版社, 1997. YAN W M , WU W M . Data Construction[M]. Beijing: Tsinghua University PressPress, 1997. |
[11] | JP 1-02. Department of Defence Dictionary of Military and Associated Terms[S]. Washington DC:U.S.Joint Staff, 2010. |
[12] | 严士健, 王隽骧, 刘秀芳 . 概率论基础[M]. 北京: 科学出版社, 2007. YAN S J , WANG J X , LIU X F . Foundations of Probability Theory[M]. Beijing: Science PressPress, 2007. |
[13] | 茆诗松, 王静龙, 濮晓龙 . 高等数理统计[M]. 北京: 高等教育出版社, 2009. MAO S S , WANG J L , PU X L . Advanced Mathematical Statistics[M]. Beijing: China Higher Education PressPress, 2009. |
[14] | BILL F , 黄海, 车皓阳, ,等译. 驾驭大数据[M]. 北京: 人民邮电出版社, 2013. BILL F , HUANG H , CHE H Y ,et al. Taming the Big Data Tidal Wave[M]. Beijing: Posts & Telecom PressPress, 2013. |
[15] | 陆嘉恒 . 大数据挑战与 NoSQL 数据库技术[M]. 北京: 电子工业出版社, 2013. LU J H . Large Data Challenge with NoSQL Database Technology[M]. Beijing:Electronic Industry Press. 2013. |
[16] | 赵刚 . 大数据技术与应用实践指南[M]. 北京: 电子工业出版社, 2013. ZHAO G . Big Data Technology and Application of Practice Guidelines[M]. Beijing: Electronic Industry PressPress, 2013. |
[17] | EDWAR DS , HAROLD M . Galois Theory[M]. Springer-Verlag, 1984. |
[18] | RUDOLF L , HARALD N . Finite Fields[M]. Addison-Wesley Publishing Company, 1983. |
[19] | 梁之舜, 邓集贤, 杨维权 等. 概率论及数理统计[M]. 北京: 高等教育出版社, 1992. LIANG Z S , DENG J X , YANG W Q ,et al. Probability Theory and Mathematical Statistics[M]. Beijing: China Higher Education PressPress, 1992. |
[20] | 陆传荣, 林正炎, 陆传赉 . 概率论极限理论引论[M]. 北京: 高等教育出版社, 1989. LU C R , LIN Z Y , LU C J . The Theory of Probability Limit Theory Introduction[M]. Beijing: China Higher Education PressPress, 1989. |
[21] | BEEK P , VAN Z . Wahrscheinlichkeits theorie[R]. 1972. |
[22] | 候方勇 . 存储系统数据机密性与完整性保护的关键技术研究[D]. 北京:国防科学技术大学, 2005. HOU F Y . Research on Key Technologies of Storage System,Data Confidentiality and Integrity Protection[D]. Beijing:National Defense Science and Technology Unviersity, 2005. |
[23] | BELL D E , LAPADULA L J . Secure Computer Systems:Unified Exposition and Multics Interpretation[M]. Bedford,MA: The MITRE CorporationPress, 1976. |
[24] | BELL D E , LAPADULA L J . Secure Computer Systems:Mathematical Foundations[M]. Bedford,MA: Electronic Systems Division,Air Force System Command Corporation,Hanscom AFBPress, 1973. |
[25] | BELL D E , LAPADULA L J . Secure computer systems:a mathematical model[M]. Bedford,MA: Electronic Systems Division,Air Force System Command Corporation,Hanscom AFBPress, 1973. |
[26] | 董婵, 范修斌, 李有文 等. 应用规律下的BLP模型密级赋值方法[J]. 通信学报, 2013,34(9): 142-149. DONG C , FAN X B , LI Y W ,et al. Secret level valuation method of BLP model based on some application properties[J]. Journal on Communications, 2013,34(9): 142-149. |
[27] | 安宝宇 . 云存储中数据完整性保护关键技术研究[D]. 北京:北京邮电大学, 2012. AN BY . Cloud storage of data integrity research on Key Technologies of protection[D]. Beijing:Beijing University of Post & Telecommunication, 2012. |
[28] | BIBA K J . Integrity considerations for secure computer systems[R]. ESD-TR-76-372,Bedford,MA:USAF Electronic Systems Division,Hanscom Air Force Base, 1977. |
[29] | 黎琳, 禄凯, 国强 等. 基于Biba模型的三权分立分析[J]. 北京交通大学学报, 2013,37(5): 1-7. LI L , LU K , GUO Q ,et al. Formal analysis of power separation mechanism based on Biba model[J]. Journal of Beijing Jiaotong University, 2013,37(5): 1-7. |
[30] | 王宇, 卢晃 . 网络安全与控制技术[M]. 北京: 国防工业出版社, 2010. WANG Y , LU Y . Network security and control technology[M]. Beijing: NationalDefenceIndustryPressPress, 2010. |
[31] | SHANNON C E . A mathematical theory of communication[J]. Bell Syst.Tech. 1948,27: 379-423, 623-656. |
[32] | NOBERT W . The Human Use of Human Beings:Cybernetics and Society[M]. Da Capo Press; New edition, 1988. |
[33] | THOMAS M,COVER , JOY A . Thomas,Elements of Information Theor[M]. John Wiley & Sons,Inc. 2006. |
[34] | ANDREW N , WILLIAM D , CELIA J ,et al. PKI Implementing and Managing E-Security[M]. RSA PRSS, 2001. |
[35] | WATERS B . Efficient identity-based encryption without random oracles[J]. Lecture Notes in Computer Science, 2005,3494: 114-127. |
[36] | GENTRY C . Practical identity-based encryption without random oracles[J]. Lecture Notes in Computer Science, 2006,4004: 445-464. |
[37] | 陈华平, 范修斌, 吕述望 . 基于标示的证书认证体制 CFL[P]. 2011102500094, 2011. CHEN H P , FAN X B , LV S W . Mark certification system based on CFL[P]. 2011102500094, 2011 |
[38] | BUNNIN NICHOLAS E P . The Blackwell Companion to Philosophy[M]. Oxford: Blackwell Publishers LtdPress, 2001. |
[39] | 夏甄陶, 崔建军, 纪虎民 . 西方认识论简史[M]. 北京: 中国人民出版社, 1987. XIA Z T , CUI J J , JI H M . The Epistemological History of Westen[M]. Beijing: Beijing People's PressPress, 1987. |
[40] | 邱碧华 . 术语学、知识论和知识技术[M]. 北京: 商务印书馆, 2011. QIU B H . Terminology,Epistemology and Knowledge Technology[M]. Beijing: the Commercial PressPress, 2011. |
[41] | 刘兵, 李正风 . 自然辩证法参考读物[M]. 北京: 清华大学出版社, 2003. LIU B , LI ZF . Dialectics of Nature of Reference Books[M]. Beijing: Tsinghua University PressPress, 2003. |
[42] | 郭元林 . 复杂性科学知识论[M]. 中国书籍出版社, 2012. GUO Y L . Complexity Science Theory[M]. China Book Press, 2012. |
[43] | 何兆 . 皙学问题[M]. 北京: 商务印书馆, 2004. HE Z . Problems of Philosophy[M]. Beijing: the Commercial PressPress, 2004. |
[44] | 陈洪澜 . 知识分类与知识资源认识论[M]. 北京: 人民出版社, 2008. CHEN H L . Knowledge Classification and Knowledge resource epistemology[M]. Beijing: Beijing People's PressPress, 2008. |
[45] | 史忠植 . 知识发现[M]. 北京: 清华大学出版社, 2002. SHI Z Z . Knowledge Discoverity[M]. Beijing: Tsinghua University PressPress, 2002. |
[46] | 许文艳, 刘三阳 . 知识库系统的逻辑基础[J]. 计算机学报, 2009(32):11, 2123-2128. XU W Y , LIU S Y . Logic for knowledgebase systems[J] Chinese Journal of Computers, 2009(32):11, 2123-2128. |
[47] | LING M , PAUL V . An Introduction to Kolmogorov Complexity and Its Application[M]. Springer-Verlag, 1997. |
[48] | 王飞跃 . 天命唯新:迈向知识自动化—《自动化学报》创刊50周年刊序[J]. 自动化学报, 2013,39(11): 1741-1743. WANG F Y . The destiny:towards knowledge automation—— preface of the special issue for the 50th anniversary of Acta Automatica Sinica[J]. Acta Automatic Sinica, 2013,39(11): 1741-1743. |
[1] | Weijie MAI, Weili LIU, Jinghui ZHONG. Self-adaptive differential evolution algorithm based on population state information [J]. Journal on Communications, 2023, 44(6): 34-46. |
[2] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[3] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[4] | Ping ZHANG, Kai NIU, Shengshi YAO, Jincheng DAI. Semantic communications for future: basic principle and implementation methodology [J]. Journal on Communications, 2023, 44(5): 1-14. |
[5] | Guangming SHI, Minxi YANG, Dahua GAO, Jingxuan CHAI. Communication framework for directed transmission of informative semantic [J]. Journal on Communications, 2023, 44(5): 15-27. |
[6] | Zhijin QIN, Tantan ZHAO, Fan LI, Xiaoming TAO. Survey of research on multimodal semantic communication [J]. Journal on Communications, 2023, 44(5): 28-41. |
[7] | Ying FANG, Yiwen XU, Tiesong ZHAO. Joint vibrotactile coding for machine recognition and human perception [J]. Journal on Communications, 2023, 44(5): 42-51. |
[8] | Hui JIANG, Tianliu HE, Min LIU, Sheng SUN, Yuwei WANG. High-performance federated continual learning algorithm for heterogeneous streaming data [J]. Journal on Communications, 2023, 44(5): 123-136. |
[9] | Pengzheng XU, Qiyue YU, Hongchi LIN, Haining LIU. Novel air-to-air data link system based on millimeter wave communication [J]. Journal on Communications, 2023, 44(4): 27-37. |
[10] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[11] | Junfeng TIAN, Qianyu YANG, Xiao Jitian. Distributed audit causal consistency model based on biased stability [J]. Journal on Communications, 2023, 44(3): 164-177. |
[12] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[13] | Jingya YANG, Xiaogang TANG, Yiqing ZHOU, Ling LIU, Wang Jiangzhou. 6G native intelligence network architecture enabled by intent abstraction and knowledge [J]. Journal on Communications, 2023, 44(2): 12-26. |
[14] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[15] | Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG. Feature dependence graph based source code loophole detection method [J]. Journal on Communications, 2023, 44(1): 103-117. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|