Loading…
Study on Mine Information Security Based on Multi-View Method
Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine i...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 5 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Liu Tao Qi Ai-Ling Hou Yuan-Bin Chang Xin-Tan |
description | Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system. |
doi_str_mv | 10.1109/EBISS.2009.5138087 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_5138087</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5138087</ieee_id><sourcerecordid>5138087</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-71af05f841402dc45a545b35b5016fa52ff098d1d14d43dbfdc09e62b73a174b3</originalsourceid><addsrcrecordid>eNpFUM1OwzAYC4JJjNEXgEtfoOX7ki9tcuDApgGVNnHoxHVKm0QEbSvqj1DffgMm4Ytly_bBjN0hpIigH5bzoixTDqBTiUKByi9YpHOFxIm4RhCX_5qk0vqKTTlmmEhNfMJuTlWl4ad4zaKu-4QTSPJc8yl7LPvBjnFziNfh4OLi4Jt2b_pwMkpXD23ox3huOmd_I8OuD8l7cN_x2vUfjb1lE292nYvOPGOb5-Vm8Zqs3l6KxdMqCRr6JEfjQXpFSMBtTdJIkpWQlQTMvJHce9DKokWyJGzlbQ3aZbzKhcGcKjFj93-zwTm3_WrD3rTj9nyGOAKRL004</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Study on Mine Information Security Based on Multi-View Method</title><source>IEEE Xplore All Conference Series</source><creator>Liu Tao ; Qi Ai-Ling ; Hou Yuan-Bin ; Chang Xin-Tan</creator><creatorcontrib>Liu Tao ; Qi Ai-Ling ; Hou Yuan-Bin ; Chang Xin-Tan</creatorcontrib><description>Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system.</description><identifier>ISSN: 2161-5942</identifier><identifier>ISBN: 9781424445899</identifier><identifier>ISBN: 1424429099</identifier><identifier>ISBN: 9781424429097</identifier><identifier>ISBN: 1424445892</identifier><identifier>EISBN: 9781424429103</identifier><identifier>EISBN: 1424429102</identifier><identifier>DOI: 10.1109/EBISS.2009.5138087</identifier><identifier>LCCN: 2008908087</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computerized monitoring ; Control systems ; Data security ; Financial management ; Information analysis ; Information security ; Information systems ; Management information systems ; Real time systems ; Safety</subject><ispartof>2009 International Conference on E-Business and Information System Security, 2009, p.1-5</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5138087$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27904,54533,54898,54910</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5138087$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu Tao</creatorcontrib><creatorcontrib>Qi Ai-Ling</creatorcontrib><creatorcontrib>Hou Yuan-Bin</creatorcontrib><creatorcontrib>Chang Xin-Tan</creatorcontrib><title>Study on Mine Information Security Based on Multi-View Method</title><title>2009 International Conference on E-Business and Information System Security</title><addtitle>EBISS</addtitle><description>Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system.</description><subject>Computerized monitoring</subject><subject>Control systems</subject><subject>Data security</subject><subject>Financial management</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Information systems</subject><subject>Management information systems</subject><subject>Real time systems</subject><subject>Safety</subject><issn>2161-5942</issn><isbn>9781424445899</isbn><isbn>1424429099</isbn><isbn>9781424429097</isbn><isbn>1424445892</isbn><isbn>9781424429103</isbn><isbn>1424429102</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFUM1OwzAYC4JJjNEXgEtfoOX7ki9tcuDApgGVNnHoxHVKm0QEbSvqj1DffgMm4Ytly_bBjN0hpIigH5bzoixTDqBTiUKByi9YpHOFxIm4RhCX_5qk0vqKTTlmmEhNfMJuTlWl4ad4zaKu-4QTSPJc8yl7LPvBjnFziNfh4OLi4Jt2b_pwMkpXD23ox3huOmd_I8OuD8l7cN_x2vUfjb1lE292nYvOPGOb5-Vm8Zqs3l6KxdMqCRr6JEfjQXpFSMBtTdJIkpWQlQTMvJHce9DKokWyJGzlbQ3aZbzKhcGcKjFj93-zwTm3_WrD3rTj9nyGOAKRL004</recordid><startdate>200905</startdate><enddate>200905</enddate><creator>Liu Tao</creator><creator>Qi Ai-Ling</creator><creator>Hou Yuan-Bin</creator><creator>Chang Xin-Tan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200905</creationdate><title>Study on Mine Information Security Based on Multi-View Method</title><author>Liu Tao ; Qi Ai-Ling ; Hou Yuan-Bin ; Chang Xin-Tan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-71af05f841402dc45a545b35b5016fa52ff098d1d14d43dbfdc09e62b73a174b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Computerized monitoring</topic><topic>Control systems</topic><topic>Data security</topic><topic>Financial management</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Information systems</topic><topic>Management information systems</topic><topic>Real time systems</topic><topic>Safety</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu Tao</creatorcontrib><creatorcontrib>Qi Ai-Ling</creatorcontrib><creatorcontrib>Hou Yuan-Bin</creatorcontrib><creatorcontrib>Chang Xin-Tan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu Tao</au><au>Qi Ai-Ling</au><au>Hou Yuan-Bin</au><au>Chang Xin-Tan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Study on Mine Information Security Based on Multi-View Method</atitle><btitle>2009 International Conference on E-Business and Information System Security</btitle><stitle>EBISS</stitle><date>2009-05</date><risdate>2009</risdate><spage>1</spage><epage>5</epage><pages>1-5</pages><issn>2161-5942</issn><isbn>9781424445899</isbn><isbn>1424429099</isbn><isbn>9781424429097</isbn><isbn>1424445892</isbn><eisbn>9781424429103</eisbn><eisbn>1424429102</eisbn><abstract>Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system.</abstract><pub>IEEE</pub><doi>10.1109/EBISS.2009.5138087</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2161-5942 |
ispartof | 2009 International Conference on E-Business and Information System Security, 2009, p.1-5 |
issn | 2161-5942 |
language | eng |
recordid | cdi_ieee_primary_5138087 |
source | IEEE Xplore All Conference Series |
subjects | Computerized monitoring Control systems Data security Financial management Information analysis Information security Information systems Management information systems Real time systems Safety |
title | Study on Mine Information Security Based on Multi-View Method |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T15%3A38%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Study%20on%20Mine%20Information%20Security%20Based%20on%20Multi-View%20Method&rft.btitle=2009%20International%20Conference%20on%20E-Business%20and%20Information%20System%20Security&rft.au=Liu%20Tao&rft.date=2009-05&rft.spage=1&rft.epage=5&rft.pages=1-5&rft.issn=2161-5942&rft.isbn=9781424445899&rft.isbn_list=1424429099&rft.isbn_list=9781424429097&rft.isbn_list=1424445892&rft_id=info:doi/10.1109/EBISS.2009.5138087&rft.eisbn=9781424429103&rft.eisbn_list=1424429102&rft_dat=%3Cieee_CHZPO%3E5138087%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-71af05f841402dc45a545b35b5016fa52ff098d1d14d43dbfdc09e62b73a174b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5138087&rfr_iscdi=true |