{"title":"网络安全与安全注意事项","authors":"Yishan Gong, Guanghong Yue, Quansheng Xu","doi":"10.1109/ICFN.2010.16","DOIUrl":null,"url":null,"abstract":"A more and more enterprises using Web services to accelerate its own development. At this point, how to network in an open application environment, guard the confidentiality of their data, resources are more and more concern for people, network security has become the network an integral part of the building. This paper introduces the architecture of network security, and further information on the types of security threats, network security so that readers with some basic understanding of the types of security services in this article in accordance with established safety precautions, and finally the introduction of security rules can be achieved.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Network Security and Safety Precautions\",\"authors\":\"Yishan Gong, Guanghong Yue, Quansheng Xu\",\"doi\":\"10.1109/ICFN.2010.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A more and more enterprises using Web services to accelerate its own development. At this point, how to network in an open application environment, guard the confidentiality of their data, resources are more and more concern for people, network security has become the network an integral part of the building. This paper introduces the architecture of network security, and further information on the types of security threats, network security so that readers with some basic understanding of the types of security services in this article in accordance with established safety precautions, and finally the introduction of security rules can be achieved.\",\"PeriodicalId\":185491,\"journal\":{\"name\":\"2010 Second International Conference on Future Networks\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Future Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFN.2010.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Future Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFN.2010.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A more and more enterprises using Web services to accelerate its own development. At this point, how to network in an open application environment, guard the confidentiality of their data, resources are more and more concern for people, network security has become the network an integral part of the building. This paper introduces the architecture of network security, and further information on the types of security threats, network security so that readers with some basic understanding of the types of security services in this article in accordance with established safety precautions, and finally the introduction of security rules can be achieved.