Journal of Shanghai Jiaotong University ›› 2018, Vol. 52 ›› Issue (10): 1370-1381.doi: 10.16183/j.cnki.jsjtu.2018.10.028
Previous Articles Next Articles
LI Jianhua
CLC Number:
LI Jianhua. A Survey of New E-Government and Its Security Technologies[J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381.
Add to citation manager EndNote|Ris|BibTeX
URL: https://xuebao.sjtu.edu.cn/EN/10.16183/j.cnki.jsjtu.2018.10.028
[1]熊涛. 政务云对电子政务的支撑研究[J]. 电子商务, 2018, 5: 31-32. XIONG Tao. Study on the government cloud support for e-government [J]. E-Business Journal, 2018, 5: 31-32. [2]梁紫怡. “互联网+”时代电子政务发展趋势初探[J]. 中小企业管理与科技(中旬刊), 2018, 4: 110-111. LIANG Ziyi. A preliminary study on the development trend of e-government in the “Internet+” era[J]. Management and Technology of SME (Mid Magazine), 2018, 4: 110-111. [3]新华网舆情监测分析中心. 全国政务新媒体综合影响力报告[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm. Xinhuanet Public Opinion Monitoring and Analysis Center. National government new media comprehensive impact report[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm. [4]梅宏. 推进“一网、一门、一次”改革 深化“互联网+政务服务”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm. MEI Hong. Promote “one network, one, once” reform deepen the “Internet + government services”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm. [5]白银元, 刘琼芳, 胡新丽. 中美电子政务发展比较分析[J]. 现代商贸工业, 2013, 25(2): 66-69. BAI Yinyuan, LIU Qiongfang, HU Xinli. A comparative analysis of the development of e-government between China and the United States[J]. Modern Business Trade Industry, 2013, 25(2): 66-69. [6]TINHOLT D, VAN DER LINDEN N, GROENEVELD A, et al. eGovernment benchmark 2017[EB/OL]. (2017-11-17)[2018-06-30]. https: //www.capgemini.com/wp-content/uploads/2017/11/2017-egovernment-benchmark_background_v7.pdf. [7]European Commission. European eGovernment Action Plan 2016-2020[R]. Brussels: European Commission, 2016. [8]European Union Agency for Network and Information Security(ENISA). Security framework for governmental clouds[R]. Brussels: European Commission, 2015. [9]吴曼青. 新时代政务信息系统建设的目标、思路与重点[EB/OL]. [2018-07-04].http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml. WU Manqing. Objectives, ideas and priorities for the construction of a new era of government affairs information system[EB/OL]. [2018-07-04]. http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml. [10]殷利梅. 新加坡电子政务总体规划(2011—2015)及启示[J]. 信息化建设, 2011, 11: 38-41. YIN Limei. Singapore’s e-government master plan (2011-2015) and its enlightenment[J]. Information Construction, 2011, 11: 38-41. [11]吴昊, 孙宝文. 当前我国电子政务发展现状、问题及对策实证研究[J]. 国家行政学院学报, 2009, 5: 123-127. WU Hao, SUN Baowen. Current status, problems and countermeasures of e-government development in China[J]. Journal of National School of Administration, 2009, 5: 123-127. [12]国家信息安全工程技术研究中心. 电子政务总体设计与技术实现[M]. 北京: 电子工业出版社, 2003. National Information Security Engineering Technology Research Center. Overall design and technology implementation of e-government [M]. Beijing: Publishing House of Electronics Industry, 2003. [13]张成福, 唐钧. 电子政务绩效评估: 模式研究与中国战略[J]. 探索, 2004, 2: 36-40. ZHANG Chengfu, TANG Jun. E-government performance evaluation: Model research and China strategy[J]. Exploration, 2004, 2: 36-40. [14]HAYES B. Cloud computing[J]. Communications of the ACM, 2008, 51(7): 9-11. [15]JACOBSON D H. A view on cloud computing[J]. International Journal of Computers & Technology, 2010, 4(2): 50-58. [16]BUYYA R, YEO C S, VENUGOPAL S, et al. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems, 2009, 25(6): 599-616. [17]罗军舟, 金嘉晖, 宋爱波, 等. 云计算: 体系架构与关键技术[J]. 通信学报, 2011, 32(7): 3-21. LUO Junzhou, JIN Jiahui, SONG Aibo, et al. Cloud computing: Architecture and key technologies[J]. Transactions of Communications, 2011, 32(7): 3-21. [18]SUBASHINI S, KAVITHA V. A survey on security issues in service delivery models of cloud computing[J]. Journal of Network & Computer Applications, 2011, 34(1): 1-11. [19]BELOGLAZOV A, ABAWAJY J, BUYYA R. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing[J]. Future Generation Computer Systems, 2012, 28(5): 755-768. [20]温锐松, 石友康. 基于云计算的电子政务公共平台顶层设计的研究与探索[J]. 电信网技术, 2014, 2: 26-34. WEN Ruisong, SHI Youkang. Research and exploration of top-level design of electronic government common platform based on cloud computing[J]. Telecommunications Network Technology, 2014, 2: 26-34. [21]BONOMI F, MILITO R, ZHU J, et al. Fog computing and its role in the internet of things[C]//Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. Helsinki, Finland: ACM, 2012: 13-16. [22]STOJMENOVIC I, WEN S. The fog computing paradigm: Scenarios and security issues[C]//2014 Federated Conference on Computer Science and Information Systems. Warsaw, Poland: IEEE, 2014: 1-8. [23]殷康. 从云计算到雾计算[J]. 高科技与产业化, 2014, 10(7): 76-79. YIN Kang. From cloud computing to fog calculation[J]. High Tech and Industrialization, 2014, 10(7): 76-79. [24]YI S, LI C, LI Q. A survey of fog computing: Concepts, applications and issues[C]//The Workshop on Mobile Big Data. Hangzhou: ACM, 2015: 37-42. [25]HE S, DONG M, OTA K, et al. Software-defined efficient service reconstruction in fog using content awareness and weighted graph[C]//2017 IEEE Global Communications Conference. Singapore: IEEE, 2017: 1-6. [26]SHI W, CAO J, ZHANG Q, et al. Edge computing: Vision and challenges[J]. IEEE Internet of Things Journal, 2016, 3(5): 637-646. [27]WOOD T, RAMAKRISHNAN K K, HWANG J, et al. Toward a software-based network: Integrating software defined networking and network function virtualization [J]. IEEE Network, 2015, 29(3): 36-41. [28]BOCCARDI F, HEATH R W, LOZANO A, et al. Five disruptive technology directions for 5G[J]. IEEE Communications Magazine, 2014, 52(2): 74-80. [29]OSSEIRAN A, BOCCARDI F, BRAUN V, et al. Scenarios for 5G mobile and wireless communications: The vision of the METIS project[J]. Communications Magazine IEEE, 2014, 52(5): 26-35. [30]WANG C X, HAIDER F, GAO X, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. Journal of Chongqing University of Posts & Telecommunications, 2014, 52(2): 122-130. [31]李福昌. 5G技术在4G网络中应用的前景探讨[J]. 通信世界, 2017, 13: 50-52. LI Fuchang. Discussion on the application of 5G technology in 4G network[J]. Communications, 2017, 13: 50-52. [32]欧阳秋梅, 吴超. 大数据与传统安全统计数据的比较及其应用展望[J]. 中国安全科学学报, 2016, 26(3): 1-7. OUYANG Qiumei, WU Chao. Comparison of big data and traditional security statistics and its application prospects[J]. China Safety Science Journal, 2016, 26(3): 1-7. [33]林龙成, 陈波, 郭向民. 传统网络安全防御面临的新威胁: APT攻击[J]. 信息安全与技术, 2013, 4(3): 20-25. LIN Longcheng, CHEN Bo, GUO Xiangmin. A new threat to traditional network security defense: APT attack[J]. Information Security & Technology, 2013, 4(3): 20-25. [34]栾庆林, 卢辉斌. 自适应遗传算法优化神经网络的入侵检测研究[J]. 计算机工程与设计, 2008, 29(12): 3022-3025. LUAN Qinglin, LU Huibin. Research of intrusion detection based on neural network optimized by adaptive genetic algorithm[J]. Computer Engineering and Design, 2008, 29(12): 3022-3025. [35]DATTA A, FRANKLIN J, GARG D, et al. A logic of secure systems and its application to trusted computing[C]//30th IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2009: 221-236. [36]郭瑞. 深度动态防御应对APT攻击[J]. 信息安全与技术, 2014, 9: 67-69. GUO Rui. Deep dynamic defense against APT attacks[J]. Information Security and Technology, 2014, 9: 67-69. [37]ROMEIS C, JAEGER J. Dynamic protection security assessment, a technique for blackout prevention[C]//2013 IEEE Grenoble Conference. Grenoble, France: IEEE, 2013: 1-6. [38]席荣荣, 云晓春, 金舒原, 等. 网络安全态势感知研究综述[J]. 计算机应用, 2012, 32(1): 1-4. XI Rongrong, YUN Xiaochun, JIN Shuyuan, et al. Review of network security situational awareness research[J]. Journal of Computer Applications, 2012, 32(1): 1-4. [39]贾焰, 王晓伟, 韩伟红, 等. YHSSAS: 面向大规模网络的安全态势感知系统[J]. 计算机科学, 2011, 38(2): 4-8. JIA Yan, WANG Xiaowei, HAN Weihong, et al. YHSSAS: Security situation awareness system for large-scale networks[J]. Computer Science, 2011, 38(2): 4-8. [40]张勇, 谭小彬, 崔孝林, 等. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011, 22(3): 495-508. ZHANG Yong, TAN Xiaobin, CUI Xiaolin, et al. Network security situational awareness method based on Markov game model[J]. Journal of Software, 2011, 22(3): 495-508. |
[1] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
[2] | ZHOU Yi, QIN Kangping, SUN Jinwen, FAN Dongqi, ZHENG Yiming. Real-Time Risk Evaluation Method of Power System Equipment and N-m Fault Contingency Plan Generation Under Typhoon Meteorological Environment [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 22-30. |
[3] | WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81. |
[4] | ZHANG Taolue∗ (张韬略), TU Huizhao (涂辉招), QIU Wei (邱 炜). Developing High-Precision Maps for Automated Driving in China: Legal Obstacles and the Way to Overcome Them [J]. J Shanghai Jiaotong Univ Sci, 2021, 26(5): 658-669. |
[5] | CHEN Ying, WEI Guoning, TANG Shengyong, KANG Zhiyu. Global Space Security Situation Analysis and Development Proposal [J]. Air & Space Defense, 2021, 4(3): 99-104. |
[6] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions [J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
[7] | YANG Guangyu, QIU Hongbing. Robust Optimization for Energy Efficiency for Secrecy MIMO SWIPT Systems [J]. Journal of Shanghai Jiao Tong University, 2020, 54(4): 369-375. |
[8] | SUN Zhuo,LIU Dong,XIAO Anhong,MING Pingzhou,GUO Wen,ZHOU Junyi,CHEN Junjie. Information Security Analysis of Digital Control System Based on Attack Tree Model [J]. Journal of Shanghai Jiaotong University, 2019, 53(Sup.1): 68-73. |
[9] | SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研). Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 666-670. |
[10] | HUA Cunqing. A Survey of Security Detection and Protection for Internet of Things [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1307-1313. |
[11] | XIA Yubin,CHEN Haibo,GUAN Haibing. Research on Computer System Isolation [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1339-1347. |
[12] | YI Ping,WANG Kedi,HUANG Cheng,GU Shuangchi,ZOU Futai,LI Jianhua. Adversarial Attacks in Artificial Intelligence: A Survey [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1298-1306. |
[13] | Zhang Wei. Research on Key Technologies of Air Space [J]. Air & Space Defense, 2018, 1(1): 13-17. |
[14] | Xu WU, Renan CHEN, Dezhi WEI. Design and Application of Speech Lab under Cloud Computing [J]. Research and Exploration in Laboratory, 2017, 36(5): 239-242. |
[15] | Xijiang CHEN, Guang ZHANG, Xianfeng CHEN, Hao WU. Diversified Safety Science and Engineering Innovation Experiment Platform [J]. Research and Exploration in Laboratory, 2017, 36(5): 260-263. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||