Security Protection

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 145578 Experts worldwide ranked by ideXlab platform

Zhang Bei - One of the best experts on this subject based on the ideXlab platform.

  • Study on Security Protection System of Enterprise Network based on Security Domain
    Computers & Security, 2010
    Co-Authors: Zhang Bei
    Abstract:

    This paper analyzes the current Security situation of enterprise network in detail, expatiates on the network Security Protection system based on Security domain. It provides a Security domain dividing solution for Petro China according to three dividing criteria: business system, classified Security Protection and system behavior. It also combines the strategies of layered Protection and dynamic Protection based on intrusion detection to build a multi-layered, three-dimensional and dynamic network Security Protection system. This paper provides reference for design of enterprise network Security Protection solution.

Yi Kang Li - One of the best experts on this subject based on the ideXlab platform.

  • Information Security Protection Design of Electric Vehicles Charging Station
    Applied Mechanics and Materials, 2015
    Co-Authors: Huan Li, Ye Qi Ru, Yi Kang Li
    Abstract:

    Information Security is fundamental to ensuring the normal operation of charging station. Based on CAN bus and 3G wireless network, this paper discusses current threats for communication network, builds a Protection structure of information Security, and proposes an overall information Security Protection framework. The firewall mainly includes digital signature authentication which combines SHA-1 message digest algorithm and ELGamal public key cipher system. Firewall-IDS (Intrusion Detection System) interactive modules and host information Security Protection modules is also designed. This paper lays a basic foundation for Security construction of charging station’s communication network.

  • Information Security Protection Design of Electric Vehicles Charging Station
    Applied Mechanics and Materials, 2015
    Co-Authors: Huan Li, Ye Qi Ru, Yi Kang Li
    Abstract:

    Information Security is fundamental to ensuring the normal operation of charging station. Based on CAN bus and 3G wireless network, this paper discusses current threats for communication network, builds a Protection structure of information Security, and proposes an overall information Security Protection framework. The firewall mainly includes digital signature authentication which combines SHA-1 message digest algorithm and ELGamal public key cipher system. Firewall-IDS (Intrusion Detection System) interactive modules and host information Security Protection modules is also designed. This paper lays a basic foundation for Security construction of charging station’s communication network.

Cao Yijia - One of the best experts on this subject based on the ideXlab platform.

  • Security Protection architecture for power enterprise information integration based on technology of distributed intrusion tolerance with multi level defense line
    Power system technology, 2008
    Co-Authors: Cao Yijia
    Abstract:

    According to the development trend and present condition of Security Protection of power enterprise information integration,a Security Protection architecture of power enterprise information integration based on the technology of distributed intrusion tolerance with multi-level defense line is proposed.The intrusion tolerance strategies of the proposed architecture consist of following items:(A) the firewall is used as the fundamental protective measures;(B) at key nodes in non-realtime application network,the mobile agents are configured to implement on-line detection and tracking of internal and external intrusions;(C) after the intruder is successfully confirmed by intrusion detection system,according to the requirement of system Security the honeypot technology based intrusion inducting system directionally inducts the locked invading flow,and the active defensive mode protects the legitimate system from invasion;(D) by means of slicing-scattering based distributed document management style,the resilient file system serves as the last defense line of enterprise memory system.Moreover,the key Security Protection problems pertinent to transverse and longitudinal information integration as well as the application of the technologies,such as mobile agents,honeypot,resilient file system and so on,in Security Protection system are analyzed.Finally,the application of the proposed secure Protection architecture is briefly presented.

Huan Li - One of the best experts on this subject based on the ideXlab platform.

  • Information Security Protection Design of Electric Vehicles Charging Station
    Applied Mechanics and Materials, 2015
    Co-Authors: Huan Li, Ye Qi Ru, Yi Kang Li
    Abstract:

    Information Security is fundamental to ensuring the normal operation of charging station. Based on CAN bus and 3G wireless network, this paper discusses current threats for communication network, builds a Protection structure of information Security, and proposes an overall information Security Protection framework. The firewall mainly includes digital signature authentication which combines SHA-1 message digest algorithm and ELGamal public key cipher system. Firewall-IDS (Intrusion Detection System) interactive modules and host information Security Protection modules is also designed. This paper lays a basic foundation for Security construction of charging station’s communication network.

  • Information Security Protection Design of Electric Vehicles Charging Station
    Applied Mechanics and Materials, 2015
    Co-Authors: Huan Li, Ye Qi Ru, Yi Kang Li
    Abstract:

    Information Security is fundamental to ensuring the normal operation of charging station. Based on CAN bus and 3G wireless network, this paper discusses current threats for communication network, builds a Protection structure of information Security, and proposes an overall information Security Protection framework. The firewall mainly includes digital signature authentication which combines SHA-1 message digest algorithm and ELGamal public key cipher system. Firewall-IDS (Intrusion Detection System) interactive modules and host information Security Protection modules is also designed. This paper lays a basic foundation for Security construction of charging station’s communication network.

Luan Hong-zhi - One of the best experts on this subject based on the ideXlab platform.

  • A New IOT-based Security Protection System Design Scheme for Smart Substations
    Electric Power Information Technology, 2013
    Co-Authors: Luan Hong-zhi
    Abstract:

    To solve the problem that electrical equipments inside smart substations were stolen, this paper analyses the existing Security Protection methods, and provides a method to build an intelligent Security monitoring platform using the Internet of Things technology. Based on the improved frameworks and functions of the intelligent auxiliary control system, a new Security Protection design scheme applicable to smart substations is studied. Several key technologies including electronic fence, video monitoring, smart access control, internet of things, and computer network are integrated and cooperatively used in the scheme. Further, this paper studies components, functions and implementation of the system using the new design scheme, and provides a new idea for improving Security Protection measures in smart substations.