期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
论环境安全问题 被引量:61
1
作者 蔡守秋 《安全与环境学报》 CAS CSCD 2001年第5期28-32,共5页
将环境安全分为生产技术性的环境安全和社会政治性的环境安全两类 ,认为广义的环境安全是指人类赖以生存发展的环境处于一种不受污染和破坏的安全状态 ,或者说人类和世界处于一种不受环境污染和环境破坏的危害的良好状态 ,它表示自然生... 将环境安全分为生产技术性的环境安全和社会政治性的环境安全两类 ,认为广义的环境安全是指人类赖以生存发展的环境处于一种不受污染和破坏的安全状态 ,或者说人类和世界处于一种不受环境污染和环境破坏的危害的良好状态 ,它表示自然生态环境和人类生态意义上的生存和发展的风险大小。分析了当代环境安全问题的严重性和主要表现 ,包括劳动环境、生活环境和生态环境的安全问题 ,以及环境问题在传统的国家安全和军事活动领域的反映。认为环境安全是可持续发展观的一个核心观点 ;可持续发展要求满足全体人民的基本需要 ,而维护环境安全正是人们的一种基本需要。分析了外国、国际社会和中国对环境安全问题的法律控制概况 。 展开更多
关键词 环境安全问题 环境安全法 法律控制 自然技术科学 人文社会科学
下载PDF
Legal study on water environmental protection of Three Gorges Reservoir Area
2
作者 邓禾 《Journal of Chongqing University》 CAS 2007年第1期22-29,共8页
Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in cu... Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in current legal system for water environmental protection in this area, and also discusses their possible causes and potential problems in the future based on first hand materials and other literature. According to the theories of integrated river basin management and environmental equity principle, legal proposals are put forward, which include building an unitary legal system dedicated to the Reservoir Area, setting up a basin authority of the Yangtze River to preside over the resources protection and development, using interests' compensation system to solve interest conflicts among different reaches, and making concrete regulations to direct public participation in water environmental security protection of the Three Gorges Reservoir Area. 展开更多
关键词 Three Gorges Reservoir area water environmental security legal measure
下载PDF
Comprehensive experiment and evaluation on safety due to fully-mechanized mining under the Xitian River at Linxin Mine
3
作者 来兴平 任奋华 蔡美峰 《Journal of Coal Science & Engineering(China)》 2004年第2期34-36,共3页
L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environme... L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environmental protection were con- cemed greatly. Based on engineering geological environment of L3414 working face and mining factors, the color bore-bole TV inspecting, leakage of drilling fluid monitoring, simulation experiment, numerical computing, in-situ ground stress measurement and subsidence measurement, etal, these programs contribute to the formation of a scientific basis for control water safe mining and normal mining or environmental protection in the condition of existing fully-mechanized mining. 展开更多
关键词 comprehensive experiment and evaluation existing mining method control water safe mining environmental protection
下载PDF
A Concurrent Security Monitoring Method for Virtualization Environments
4
作者 TIAN Donghai JIA Xiaoqi +1 位作者 CHEN Junhua HU Changzhen 《China Communications》 SCIE CSCD 2016年第1期113-123,共11页
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani... Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead. 展开更多
关键词 security virtualization technology concurrent monitoring
下载PDF
Distributed anonymous data perturbation method for privacy-preserving data mining 被引量:4
5
作者 Feng LI Jin MA Jian-hua LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期952-963,共12页
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed s... Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment. 展开更多
关键词 Privacy-preserving data mining (PPDM) Distributed data mining Data perturbation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部