Survey of information security

The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and so...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2007-06, Vol.50 (3), p.273-298
Hauptverfasser: Shen, ChangXiang, Zhang, HuangGuo, Feng, DengGuo, Cao, ZhenFu, Huang, JiWu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 298
container_issue 3
container_start_page 273
container_title Science China. Information sciences
container_volume 50
creator Shen, ChangXiang
Zhang, HuangGuo
Feng, DengGuo
Cao, ZhenFu
Huang, JiWu
description The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.
doi_str_mv 10.1007/s11432-007-0037-2
format Article
fullrecord <record><control><sourceid>wanfang_jour_proqu</sourceid><recordid>TN_cdi_wanfang_journals_zgkx_ef200703001</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>24584282</cqvip_id><wanfj_id>zgkx_ef200703001</wanfj_id><sourcerecordid>zgkx_ef200703001</sourcerecordid><originalsourceid>FETCH-LOGICAL-c364t-eb500cde32eb2e790dc866a9e0ed7021236c291a96e5c1fa2aeb4e0c22a78fb13</originalsourceid><addsrcrecordid>eNpdkE9PwzAMxSMEEmPwAbigCSTEpeA4bZMe0cQ_CYkDcI7SzBndunZLWmB8ejJt4sDB8jv8bD8_xk45XHMAeRM4TwUmUcYSMsE9NuAqxwSVyPejBigSlJk8ZEchzABSRMEH7Oy195-0HrVuVDWu9QvTVW0zCmR7X3XrY3bgTB3oZNeH7P3-7m38mDy_PDyNb58TK_K0S6jMAOyEBFKJJAuYWJXnpiCgiQTkKHKLBTdFTpnlzqChMiWwiEYqV3IxZFfbvV-mcaaZ6lnb-yZe1D_T-bcmh_EzEAAb9HKLLn276il0elEFS3VtGmr7oCMEWSFFBC_-gX9LoxeVSaViVEPGt5T1bQienF76amH8WnPQm2j1Nlq9kZtoNcaZ893MR9tMV1X0Wxo7d1VNGtNMpahQ_AJKCnUs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918578800</pqid></control><display><type>article</type><title>Survey of information security</title><source>Springer Nature - Complete Springer Journals</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Shen, ChangXiang ; Zhang, HuangGuo ; Feng, DengGuo ; Cao, ZhenFu ; Huang, JiWu</creator><creatorcontrib>Shen, ChangXiang ; Zhang, HuangGuo ; Feng, DengGuo ; Cao, ZhenFu ; Huang, JiWu</creatorcontrib><description>The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.</description><identifier>ISSN: 1009-2757</identifier><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1862-2836</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-007-0037-2</identifier><language>eng</language><publisher>Heidelberg: Springer Nature B.V</publisher><subject>R&amp;D ; Research &amp; development ; 信息安全 ; 信息隐藏 ; 可信计算 ; 密码学 ; 网络安全</subject><ispartof>Science China. Information sciences, 2007-06, Vol.50 (3), p.273-298</ispartof><rights>Science in China Press 2007.</rights><rights>Copyright © Wanfang Data Co. Ltd. All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c364t-eb500cde32eb2e790dc866a9e0ed7021236c291a96e5c1fa2aeb4e0c22a78fb13</citedby><cites>FETCH-LOGICAL-c364t-eb500cde32eb2e790dc866a9e0ed7021236c291a96e5c1fa2aeb4e0c22a78fb13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009X/84009X.jpg</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2918578800?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,43781</link.rule.ids></links><search><creatorcontrib>Shen, ChangXiang</creatorcontrib><creatorcontrib>Zhang, HuangGuo</creatorcontrib><creatorcontrib>Feng, DengGuo</creatorcontrib><creatorcontrib>Cao, ZhenFu</creatorcontrib><creatorcontrib>Huang, JiWu</creatorcontrib><title>Survey of information security</title><title>Science China. Information sciences</title><addtitle>Science in China(Series F)</addtitle><description>The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.</description><subject>R&amp;D</subject><subject>Research &amp; development</subject><subject>信息安全</subject><subject>信息隐藏</subject><subject>可信计算</subject><subject>密码学</subject><subject>网络安全</subject><issn>1009-2757</issn><issn>1674-733X</issn><issn>1862-2836</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpdkE9PwzAMxSMEEmPwAbigCSTEpeA4bZMe0cQ_CYkDcI7SzBndunZLWmB8ejJt4sDB8jv8bD8_xk45XHMAeRM4TwUmUcYSMsE9NuAqxwSVyPejBigSlJk8ZEchzABSRMEH7Oy195-0HrVuVDWu9QvTVW0zCmR7X3XrY3bgTB3oZNeH7P3-7m38mDy_PDyNb58TK_K0S6jMAOyEBFKJJAuYWJXnpiCgiQTkKHKLBTdFTpnlzqChMiWwiEYqV3IxZFfbvV-mcaaZ6lnb-yZe1D_T-bcmh_EzEAAb9HKLLn276il0elEFS3VtGmr7oCMEWSFFBC_-gX9LoxeVSaViVEPGt5T1bQienF76amH8WnPQm2j1Nlq9kZtoNcaZ893MR9tMV1X0Wxo7d1VNGtNMpahQ_AJKCnUs</recordid><startdate>20070601</startdate><enddate>20070601</enddate><creator>Shen, ChangXiang</creator><creator>Zhang, HuangGuo</creator><creator>Feng, DengGuo</creator><creator>Cao, ZhenFu</creator><creator>Huang, JiWu</creator><general>Springer Nature B.V</general><general>Computing Technology Institute of China Navy, Beijing 100841, China%School of Computer, Wuhan University, Wuhan 430072, China%Institute of Software, Chinese Academy of Sciences, Beijing 100080, China%Department of Computer Science and Technology, Shanghai Jiaotong University, Shanghai 200030,China%Information Technology Institute, Zhongshan University, Guangzhou 510275, China</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>2B.</scope><scope>4A8</scope><scope>92I</scope><scope>93N</scope><scope>PSX</scope><scope>TCJ</scope></search><sort><creationdate>20070601</creationdate><title>Survey of information security</title><author>Shen, ChangXiang ; Zhang, HuangGuo ; Feng, DengGuo ; Cao, ZhenFu ; Huang, JiWu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c364t-eb500cde32eb2e790dc866a9e0ed7021236c291a96e5c1fa2aeb4e0c22a78fb13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>R&amp;D</topic><topic>Research &amp; development</topic><topic>信息安全</topic><topic>信息隐藏</topic><topic>可信计算</topic><topic>密码学</topic><topic>网络安全</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shen, ChangXiang</creatorcontrib><creatorcontrib>Zhang, HuangGuo</creatorcontrib><creatorcontrib>Feng, DengGuo</creatorcontrib><creatorcontrib>Cao, ZhenFu</creatorcontrib><creatorcontrib>Huang, JiWu</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Wanfang Data Journals - Hong Kong</collection><collection>WANFANG Data Centre</collection><collection>Wanfang Data Journals</collection><collection>万方数据期刊 - 香港版</collection><collection>China Online Journals (COJ)</collection><collection>China Online Journals (COJ)</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shen, ChangXiang</au><au>Zhang, HuangGuo</au><au>Feng, DengGuo</au><au>Cao, ZhenFu</au><au>Huang, JiWu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survey of information security</atitle><jtitle>Science China. Information sciences</jtitle><addtitle>Science in China(Series F)</addtitle><date>2007-06-01</date><risdate>2007</risdate><volume>50</volume><issue>3</issue><spage>273</spage><epage>298</epage><pages>273-298</pages><issn>1009-2757</issn><issn>1674-733X</issn><eissn>1862-2836</eissn><eissn>1869-1919</eissn><abstract>The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of information security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.</abstract><cop>Heidelberg</cop><pub>Springer Nature B.V</pub><doi>10.1007/s11432-007-0037-2</doi><tpages>26</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1009-2757
ispartof Science China. Information sciences, 2007-06, Vol.50 (3), p.273-298
issn 1009-2757
1674-733X
1862-2836
1869-1919
language eng
recordid cdi_wanfang_journals_zgkx_ef200703001
source Springer Nature - Complete Springer Journals; Alma/SFX Local Collection; ProQuest Central
subjects R&D
Research & development
信息安全
信息隐藏
可信计算
密码学
网络安全
title Survey of information security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T21%3A57%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wanfang_jour_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survey%20of%20information%20security&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Shen,%20ChangXiang&rft.date=2007-06-01&rft.volume=50&rft.issue=3&rft.spage=273&rft.epage=298&rft.pages=273-298&rft.issn=1009-2757&rft.eissn=1862-2836&rft_id=info:doi/10.1007/s11432-007-0037-2&rft_dat=%3Cwanfang_jour_proqu%3Ezgkx_ef200703001%3C/wanfang_jour_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918578800&rft_id=info:pmid/&rft_cqvip_id=24584282&rft_wanfj_id=zgkx_ef200703001&rfr_iscdi=true