Loading…

Study on Mine Information Security Based on Multi-View Method

Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine i...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu Tao, Qi Ai-Ling, Hou Yuan-Bin, Chang Xin-Tan
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 5
container_issue
container_start_page 1
container_title
container_volume
creator Liu Tao
Qi Ai-Ling
Hou Yuan-Bin
Chang Xin-Tan
description Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system.
doi_str_mv 10.1109/EBISS.2009.5138087
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_5138087</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5138087</ieee_id><sourcerecordid>5138087</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-71af05f841402dc45a545b35b5016fa52ff098d1d14d43dbfdc09e62b73a174b3</originalsourceid><addsrcrecordid>eNpFUM1OwzAYC4JJjNEXgEtfoOX7ki9tcuDApgGVNnHoxHVKm0QEbSvqj1DffgMm4Ytly_bBjN0hpIigH5bzoixTDqBTiUKByi9YpHOFxIm4RhCX_5qk0vqKTTlmmEhNfMJuTlWl4ad4zaKu-4QTSPJc8yl7LPvBjnFziNfh4OLi4Jt2b_pwMkpXD23ox3huOmd_I8OuD8l7cN_x2vUfjb1lE292nYvOPGOb5-Vm8Zqs3l6KxdMqCRr6JEfjQXpFSMBtTdJIkpWQlQTMvJHce9DKokWyJGzlbQ3aZbzKhcGcKjFj93-zwTm3_WrD3rTj9nyGOAKRL004</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Study on Mine Information Security Based on Multi-View Method</title><source>IEEE Xplore All Conference Series</source><creator>Liu Tao ; Qi Ai-Ling ; Hou Yuan-Bin ; Chang Xin-Tan</creator><creatorcontrib>Liu Tao ; Qi Ai-Ling ; Hou Yuan-Bin ; Chang Xin-Tan</creatorcontrib><description>Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system.</description><identifier>ISSN: 2161-5942</identifier><identifier>ISBN: 9781424445899</identifier><identifier>ISBN: 1424429099</identifier><identifier>ISBN: 9781424429097</identifier><identifier>ISBN: 1424445892</identifier><identifier>EISBN: 9781424429103</identifier><identifier>EISBN: 1424429102</identifier><identifier>DOI: 10.1109/EBISS.2009.5138087</identifier><identifier>LCCN: 2008908087</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computerized monitoring ; Control systems ; Data security ; Financial management ; Information analysis ; Information security ; Information systems ; Management information systems ; Real time systems ; Safety</subject><ispartof>2009 International Conference on E-Business and Information System Security, 2009, p.1-5</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5138087$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27904,54533,54898,54910</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5138087$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu Tao</creatorcontrib><creatorcontrib>Qi Ai-Ling</creatorcontrib><creatorcontrib>Hou Yuan-Bin</creatorcontrib><creatorcontrib>Chang Xin-Tan</creatorcontrib><title>Study on Mine Information Security Based on Multi-View Method</title><title>2009 International Conference on E-Business and Information System Security</title><addtitle>EBISS</addtitle><description>Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system.</description><subject>Computerized monitoring</subject><subject>Control systems</subject><subject>Data security</subject><subject>Financial management</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Information systems</subject><subject>Management information systems</subject><subject>Real time systems</subject><subject>Safety</subject><issn>2161-5942</issn><isbn>9781424445899</isbn><isbn>1424429099</isbn><isbn>9781424429097</isbn><isbn>1424445892</isbn><isbn>9781424429103</isbn><isbn>1424429102</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFUM1OwzAYC4JJjNEXgEtfoOX7ki9tcuDApgGVNnHoxHVKm0QEbSvqj1DffgMm4Ytly_bBjN0hpIigH5bzoixTDqBTiUKByi9YpHOFxIm4RhCX_5qk0vqKTTlmmEhNfMJuTlWl4ad4zaKu-4QTSPJc8yl7LPvBjnFziNfh4OLi4Jt2b_pwMkpXD23ox3huOmd_I8OuD8l7cN_x2vUfjb1lE292nYvOPGOb5-Vm8Zqs3l6KxdMqCRr6JEfjQXpFSMBtTdJIkpWQlQTMvJHce9DKokWyJGzlbQ3aZbzKhcGcKjFj93-zwTm3_WrD3rTj9nyGOAKRL004</recordid><startdate>200905</startdate><enddate>200905</enddate><creator>Liu Tao</creator><creator>Qi Ai-Ling</creator><creator>Hou Yuan-Bin</creator><creator>Chang Xin-Tan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200905</creationdate><title>Study on Mine Information Security Based on Multi-View Method</title><author>Liu Tao ; Qi Ai-Ling ; Hou Yuan-Bin ; Chang Xin-Tan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-71af05f841402dc45a545b35b5016fa52ff098d1d14d43dbfdc09e62b73a174b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Computerized monitoring</topic><topic>Control systems</topic><topic>Data security</topic><topic>Financial management</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Information systems</topic><topic>Management information systems</topic><topic>Real time systems</topic><topic>Safety</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu Tao</creatorcontrib><creatorcontrib>Qi Ai-Ling</creatorcontrib><creatorcontrib>Hou Yuan-Bin</creatorcontrib><creatorcontrib>Chang Xin-Tan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu Tao</au><au>Qi Ai-Ling</au><au>Hou Yuan-Bin</au><au>Chang Xin-Tan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Study on Mine Information Security Based on Multi-View Method</atitle><btitle>2009 International Conference on E-Business and Information System Security</btitle><stitle>EBISS</stitle><date>2009-05</date><risdate>2009</risdate><spage>1</spage><epage>5</epage><pages>1-5</pages><issn>2161-5942</issn><isbn>9781424445899</isbn><isbn>1424429099</isbn><isbn>9781424429097</isbn><isbn>1424445892</isbn><eisbn>9781424429103</eisbn><eisbn>1424429102</eisbn><abstract>Information security of mine information system is premise to system application, while information security system architecture is chief task of information security study. By analyzing general requirement of security system architecture and special requirement of the complicated features of mine information system to security system architecture. By using multi-view method, it is put forward a sort of security system architecture which suited mine information system. The establishment and design of this security system architecture view sufficiently consider both the special requirement of the mine information system and structural requirement of general security system, so it can satisfy the safe requirement of mine information system.</abstract><pub>IEEE</pub><doi>10.1109/EBISS.2009.5138087</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2161-5942
ispartof 2009 International Conference on E-Business and Information System Security, 2009, p.1-5
issn 2161-5942
language eng
recordid cdi_ieee_primary_5138087
source IEEE Xplore All Conference Series
subjects Computerized monitoring
Control systems
Data security
Financial management
Information analysis
Information security
Information systems
Management information systems
Real time systems
Safety
title Study on Mine Information Security Based on Multi-View Method
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T15%3A38%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Study%20on%20Mine%20Information%20Security%20Based%20on%20Multi-View%20Method&rft.btitle=2009%20International%20Conference%20on%20E-Business%20and%20Information%20System%20Security&rft.au=Liu%20Tao&rft.date=2009-05&rft.spage=1&rft.epage=5&rft.pages=1-5&rft.issn=2161-5942&rft.isbn=9781424445899&rft.isbn_list=1424429099&rft.isbn_list=9781424429097&rft.isbn_list=1424445892&rft_id=info:doi/10.1109/EBISS.2009.5138087&rft.eisbn=9781424429103&rft.eisbn_list=1424429102&rft_dat=%3Cieee_CHZPO%3E5138087%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-71af05f841402dc45a545b35b5016fa52ff098d1d14d43dbfdc09e62b73a174b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5138087&rfr_iscdi=true