JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2016, Vol. 39 ›› Issue (3): 105-109.doi: 10.13190/j.jbupt.2016.03.019
• Reports • Previous Articles Next Articles
Information System Risk Control Method Based on Work-Flow
YANG Hong-yu, CHENG Xiang
- School of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China
-
Received:
2016-03-21Online:
2016-06-28Published:
2016-06-28
CLC Number:
Cite this article
YANG Hong-yu, CHENG Xiang. Information System Risk Control Method Based on Work-Flow[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(3): 105-109.
share this article
Add to citation manager EndNote|Ris|BibTeX
URL: https://journal.bupt.edu.cn/EN/10.13190/j.jbupt.2016.03.019
[1] 张曼. 信息安全风险评估方法的研究[J]. 信息安全与技术, 2015, 25(1):18-20. Zhang Man. Survey of information security risk assessment methods[J]. Information Security and Technology, 2015, 25(1):18-20. |
[1] | . Multi-user-oriented SWIPT-MEC Task Hierarchical Processing Offloading Mechanism [J]. Journal of Beijing University of Posts and Telecommunications, 0, (): 0-0. |
[2] | . An Optimization Scheme of Edge Caching for Panorama Video based on DQN [J]. Journal of Beijing University of Posts and Telecommunications, 0, (): 0-0. |
[3] | . Deterministic Scheduling and Routing Joint Intelligent Optimization Scheme in Computing First Network [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(2): 9-14. |
[4] | . Service Networking Over Hyper-WAN Integrated Distributed Cloud:Vision and Key Technologies [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(2): 1-8. |
[5] | . Reaserch of On-Board Edge DNN Inference Strategies For LEO Satellite Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(2): 57-63. |
[6] | . Multicast Service Chain Deployment and Adjustment Method under User Dynamic Access [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 55-61. |
[7] | . Trusted predictive cache architecture for Internet of vehicles privacy protection combined with blockchain [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 145-150. |
[8] | TIAN Zhongda, PAN Xinpeng. Network Traffic Prediction Using Wavelet Denoising and Optimized Support Vector Machine [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(5): 79-84. |
[9] | LIU Linlan, SONG Xiuyang, CHEN Yubin. Link Prediction in Opportunistic Networks Based on Network Representation Learning [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 64-69,103. |
[10] | XI Heran, ZHU Jinghua, LI Jinbao. Edge-Cloud Collaborative Worker Recruitment Algorithm in Mobile Crowd Sensing System [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 77-83. |
[11] | LI Jingbo, MA Li, MA Dongchao, FU Yingxun, LI Yang. SDN-Based Integrated Convergent Network Routing Scheduling Mechanism [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 84-90. |
[12] | . SDN-based integrated convergent network routing scheduling mechanism [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 98-104. |
[13] | . Edge-Cloud Collaborative Worker Recruitment Algorithm in Mobile Crowd Sensing System [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 91-97. |
[14] | . Node importance evaluation in multiplex heterogeneous networks based on graph embedding [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 1-76. |
[15] | LIU Likun, QIU Tie, XU Tianyi, CHEN Ning, WAN Zhiguo. User Fine-Grained Reliability and Truth Estimate Model on Mobile Crowdsensing [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 70-76. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||