CN107832634A - A kind of Dblink monitoring method and monitoring system - Google Patents

A kind of Dblink monitoring method and monitoring system Download PDF

Info

Publication number
CN107832634A
CN107832634A CN201711225398.9A CN201711225398A CN107832634A CN 107832634 A CN107832634 A CN 107832634A CN 201711225398 A CN201711225398 A CN 201711225398A CN 107832634 A CN107832634 A CN 107832634A
Authority
CN
China
Prior art keywords
dblink
database
checked
jdbc
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711225398.9A
Other languages
Chinese (zh)
Inventor
潘雨晴
任禹丞
李叶飞
葛崇慧
张欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Fangtian Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Jiangsu Fangtian Power Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201711225398.9A priority Critical patent/CN107832634A/en
Publication of CN107832634A publication Critical patent/CN107832634A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Probability & Statistics with Applications (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Fuzzy Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention discloses a kind of Dblink monitoring method and monitoring system, and monitoring method includes:Driven by JDBC and be connected with Database to be checked, then JDBC interfaces corresponding to calling obtain Dblink information, Dblink white lists based on database to be checked, the Dblink of database to be checked is monitored, judge current Dblink whether in the white list of target database, for not performing alarm, disconnection Dblink linked operations in white list, ensure the safety of target database, simultaneously staff is easily monitored to each data in power system, it is ensured that database data safety.

Description

A kind of Dblink monitoring method and monitoring system
Technical field
The present invention relates to database technical field, particularly a kind of Dblink monitoring method and monitoring system.
Background technology
Generally include multiple business application systems in power system, in order to preserve data in each business application system, generally There is a corresponding database, and due to intercrossing complicated between power business, need frequently to consult data between database, and Consulting the data of other databases needs to use Dblink, but prior art can not understand Dblink service condition and safety Property, operate very cumbersome, workload is big.
Explanation of nouns
Dblink (Database Link), the link of database.
JDBC (Java DataBase Connectivity), the connection of java databases is a kind of for performing SQL languages The Java API of sentence, unified access can be provided for a variety of relational databases, it is by one group of class write with Java language and connects Mouth composition.JDBC provides a kind of benchmark, can build the instrument and interface of higher level accordingly, enable database development personnel Write database application.
The content of the invention
, can be in the progress between database it is an object of the invention to provide the monitoring method of Dblink a kind of and monitoring system During access, Dblink service condition is connected to database(That is the interconnection situation of database)It is monitored with security.
The technical scheme that the present invention takes is:A kind of Dblink monitoring method, including:
S1, driven by JDBC and be connected with Database to be checked;
S2, obtain the Dblink white lists of database to be checked;
S3, by calling JDBC database manipulation interface, Dblink information is obtained, the Dblink got is monitored, Including:
Judge whether Dblink is contained in the Dblink white lists of S2 acquisitions, if then terminating to monitor, if otherwise will be current Dblink is arranged to doubtful illegal Dblink, closes the access rights of the Dblink, generates warning information;
S4, alarming processing is carried out, including:For Dblink corresponding to warning information, judge its whether because practical application needs and Allow to access database to be checked, corresponding Dblink is defined as unauthorized access link, outputting alarm information, prison if not allowing Control terminates, if allowing, corresponding Dblink is defined as into Lawful access link, and authorizes access rights to the Dblink, will It adds the Dblink white lists of database to be checked, then goes to step S3 and the Dblink got is monitored again, Until corresponding Dblink is contained in the Dblink white lists of S2 acquisitions, or corresponding Dblink is defined as unauthorized access Link, terminate monitoring.
In S1, JDBC drivings include:The driving of JDBC-ODBC bridges, the driving of JDBC- locals, JDBC network-drivens and local association Discuss pure JDBC drivings.Different JDBC drivings can be used for accessing different databases, and specific access mode can use prior art.
The Dblink obtained in S2 of the present invention is the Dblink white lists of corresponding target database to be checked, and its content can be by The operation maintenance personnel of associated databases is configured.
Preferably, in S3, by the Statement for calling JDBC()Interface, instantiation operation database to be checked, and hold Row executeQuery()Method, return values of the sql on Dblink is obtained, that is, obtains Dblink information.Statement connects Mouth is used on the basis of database connection is had built up, and the Simple SQL sentence without parameter to be performed is sent to database. ExecuteQuery is the method that the one of which that Statement interfaces provide performs SQL sentences, for producing single knot The sentence of fruit collection, such as SELECT sentences.
Further, S3 also includes:The Dblink blacklists of corresponding different databases to be visited are set, judged doubtful illegal Whether Dblink is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information, if otherwise going to step S4;
In S4, for considering that practical application needs not allow the Dblink for accessing database to be checked still, by corresponding Dblink Add blacklist.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, Dblink monitoring can be reduced and accused Data redundancy during alert processing.
Preferably, in S3 and S4, the Dblink of foundation is monitored at predetermined intervals and alarming processing.
In the S4 of the present invention, whether because practical application needs the judgement that accesses database to be checked is allowed to Dblink, Judged result is provided by database operation maintenance personnel.
Invention additionally discloses a kind of Dblink monitoring system, including:
Database connection establishment module, driven by JDBC and be connected with Database to be checked, obtain Dblink information;
Database connects white list acquisition module, obtains the Dblink white lists of database to be checked;
Dblink monitoring modules, judge whether currently available Dblink is included in Dblink white lists, if then terminating to monitor, If current Dblink otherwise is arranged into doubtful illegal Dblink, the access rights of the Dblink are closed, generate warning information;
Warning processing module, for Dblink corresponding to warning information, judge whether it allows to access because practical application needs Database to be checked, corresponding Dblink being defined as unauthorized access link if not allowing, outputting alarm information, monitoring terminates, If allowing, corresponding Dblink is defined as Lawful access link, and access rights are authorized to the Dblink, is added into and treats Inquire about the Dblink white lists of database.
Further, the Dblink blacklists of corresponding different databases to be visited are also preset with Dblink monitoring modules; After current Dblink is judged as doubtful illegal Dblink, whether Dblink monitoring modules also judge the doubtful illegal Dblink It is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information, if otherwise by corresponding doubtful illegal Dblink's Warning information is transmitted to warning processing module;
Warning processing module will consider that practical application needs not allow the Dblink for accessing database to be checked still, add black name It is single.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, when can reduce Dblink monitoring and alarming processing Data redundancy.
Beneficial effect
The present invention is driven by JDBC and is connected with Database to be checked, and then JDBC interfaces corresponding to calling obtain Dblink Information, the Dblink white lists based on database to be checked, is monitored to the Dblink of database to be checked so that work people Member easily can be monitored to each data in power system, obtain the service condition linked in each database, ensure The data safety of target database, meanwhile, the professional ability requirement to operation maintenance personnel substantially reduces, and can also reduce manual operation Loss caused by error.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art In the required accompanying drawing used be briefly described, it should be apparent that, drawings in the following description be only the present invention some Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the monitoring method of Dblink shown in an exemplary embodiment of the invention;
Fig. 2 is a kind of schematic flow sheet of the monitoring method of Dblink shown in another exemplary embodiment of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
With reference to shown in figure 1 and Fig. 2, Dblink of the invention monitoring method, including:
S1, driven by JDBC and be connected with Database to be checked;
S2, obtain the Dblink white lists of database to be checked;
S3, by calling JDBC database manipulation interface, Dblink information is obtained, the Dblink got is monitored, Including:
Judge whether Dblink is contained in the Dblink white lists of S2 acquisitions, if then terminating to monitor, if otherwise will be current Dblink is arranged to doubtful illegal Dblink, closes the access rights of the Dblink, generates warning information;
S4, alarming processing is carried out, including:For Dblink corresponding to warning information, judge its whether because practical application needs and Allow to access database to be checked, corresponding Dblink is defined as unauthorized access link, outputting alarm information, prison if not allowing Control terminates, if allowing, corresponding Dblink is defined as into Lawful access link, and authorizes access rights to the Dblink, will It adds the Dblink white lists of database to be checked, then goes to step S3 and the Dblink got is monitored again, Until corresponding Dblink is contained in the Dblink white lists of S2 acquisitions, or corresponding Dblink is defined as unauthorized access Link, terminate monitoring.
Embodiment 1
In S1, JDBC drivings include:Locally driving, JDBC network-drivens and native protocol are pure by the driving of JDBC-ODBC bridges, JDBC- JDBC drives.Different JDBC drivings can be used for accessing different databases, and specific access mode can use prior art.
The Dblink obtained in S2 of the present invention is the Dblink white lists of corresponding target database to be checked, and its content can be by The operation maintenance personnel of associated databases is configured.
In S3, by the Statement for calling JDBC()Interface, instantiation operation database to be checked, and perform executeQuery()Method, return values of the sql on Dblink is obtained, that is, obtains Dblink information.Statement interfaces For on the basis of database connection is had built up, the Simple SQL sentence without parameter to be performed to be sent to database. ExecuteQuery is the method that the one of which that Statement interfaces provide performs SQL sentences, for producing single knot The sentence of fruit collection, such as SELECT sentences.
Preferably, in S3 and S4, the Dblink of foundation is monitored at predetermined intervals and alarming processing.
In the S4 of the present invention, whether because practical application needs the judgement that accesses database to be checked is allowed to Dblink, Judged result is provided by database operation maintenance personnel.
Embodiment 2
In the Dblink of the present embodiment monitoring method, S3 also includes:Set the Dblink of corresponding different databases to be visited black List, judges whether doubtful illegal Dblink is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information, If otherwise go to step S4;
In S4, for considering that practical application needs not allow the Dblink for accessing database to be checked still, by corresponding Dblink Add blacklist.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, Dblink monitoring can be reduced and accused Data redundancy during alert processing.
Embodiment 3
A kind of Dblink monitoring system, including:
Database connection establishment module, driven by JDBC and be connected with Database to be checked, obtain Dblink information;
Database connects white list acquisition module, obtains the Dblink white lists of database to be checked;
Dblink monitoring modules, judge whether currently available Dblink is included in Dblink white lists, if then terminating to monitor, If current Dblink otherwise is arranged into doubtful illegal Dblink, the access rights of the Dblink are closed, generate warning information;
Warning processing module, for Dblink corresponding to warning information, judge whether it allows to access because practical application needs Database to be checked, corresponding Dblink being defined as unauthorized access link if not allowing, outputting alarm information, monitoring terminates, If allowing, corresponding Dblink is defined as Lawful access link, and access rights are authorized to the Dblink, is added into and treats Inquire about the Dblink white lists of database.
Further, the Dblink blacklists of corresponding different databases to be visited are also preset with Dblink monitoring modules; After current Dblink is judged as doubtful illegal Dblink, whether Dblink monitoring modules also judge the doubtful illegal Dblink It is contained in Dblink blacklists, if then terminating to monitor, outputting alarm information, if otherwise by corresponding doubtful illegal Dblink's Warning information is transmitted to warning processing module;
Warning processing module will consider that practical application needs not allow the Dblink for accessing database to be checked still, add black name It is single.Identification deterministic process is simplified by blacklist for the illegal Dblink in part, when can reduce Dblink monitoring and alarming processing Data redundancy.
The present invention is driven by JDBC and is connected with Database to be checked, and then JDBC interfaces corresponding to calling obtain Dblink information, the Dblink white lists based on database to be checked, is monitored to the Dblink of database to be checked so that Staff easily can be monitored to each data in power system, obtain the use feelings linked in each database Condition, ensure the data safety of target database, meanwhile, the professional ability requirement to operation maintenance personnel substantially reduces, and can also reduce Loss caused by human operational error.One of ordinary skill in the art will appreciate that it is the unit included by above-described embodiment Simply divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized; In addition, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Those of ordinary skill in the art are further appreciated that all or part of step realized in above-described embodiment method is can To instruct the hardware of correlation to complete by program, described program can be stored in a computer read/write memory medium In, described storage medium, including ROM/RAM, disk, CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.

Claims (8)

1. a kind of Dblink monitoring method, it is characterized in that, including:
S1, driven by JDBC and be connected with Database to be checked;
S2, obtain the Dblink white lists of database to be checked;
S3, by calling JDBC database manipulation interface, Dblink information is obtained, the Dblink got is monitored, Including:
Judge whether Dblink is contained in the Dblink white lists of S2 acquisitions, if then terminating to monitor, if otherwise will be current Dblink is arranged to doubtful illegal Dblink, closes the access rights of the Dblink, generates warning information;
S4, alarming processing is carried out, including:For Dblink corresponding to warning information, judge its whether because practical application needs and Allow to access database to be checked, corresponding Dblink is defined as unauthorized access link, outputting alarm information, prison if not allowing Control terminates, if allowing, corresponding Dblink is defined as into Lawful access link, and authorizes access rights to the Dblink, will It adds the Dblink white lists of database to be checked, then goes to step S3 and the Dblink got is monitored again, Until corresponding Dblink is contained in the Dblink white lists of S2 acquisitions, or corresponding Dblink is defined as unauthorized access Link, terminate monitoring.
2. Dblink according to claim 1 monitoring method, it is characterized in that, in S1, JDBC drivings include:JDBC- The driving of ODBC bridges, JDBC- locally driving, JDBC network-drivens and the pure JDBC drivings of native protocol.
3. Dblink according to claim 1 monitoring method, it is characterized in that, in S3, by calling JDBC's Statement()Interface, instantiation operation database to be checked, and perform executeQuery()Method, obtain sql on Dblink return value, that is, obtain Dblink information.
4. Dblink according to claim 1 monitoring method, it is characterized in that, S3 also includes:Corresponding difference is set to wait to visit The Dblink blacklists of database are asked, judge whether doubtful illegal Dblink is contained in Dblink blacklists, if then terminating Monitoring, outputting alarm information, if otherwise going to step S4;
In S4, for considering that practical application needs not allow the Dblink for accessing database to be checked still, by corresponding Dblink Add blacklist.
5. Dblink according to claim 1 monitoring method, it is characterized in that, in S3 and S4, at predetermined intervals The Dblink of foundation is monitored and alarming processing.
6. Dblink according to claim 1 monitoring method, it is characterized in that, in S4, to Dblink whether because actually should Allow the judgement for accessing database to be checked with needs, judged result is provided by database operation maintenance personnel.
7. a kind of Dblink monitoring system, it is characterized in that, including:
Database connection establishment module, driven by JDBC and be connected with Database to be checked, obtain Dblink information;
Database connects white list acquisition module, obtains the Dblink white lists of database to be checked;
Dblink monitoring modules, judge whether currently available Dblink is included in Dblink white lists, if then terminating to monitor, If current Dblink otherwise is arranged into doubtful illegal Dblink, the access rights of the Dblink are closed, generate warning information;
Warning processing module, for Dblink corresponding to warning information, judge whether it allows to access because practical application needs Database to be checked, corresponding Dblink being defined as unauthorized access link if not allowing, outputting alarm information, monitoring terminates, If allowing, corresponding Dblink is defined as Lawful access link, and access rights are authorized to the Dblink, is added into and treats Inquire about the Dblink white lists of database.
8. Dblink according to claim 7 monitoring system, it is characterized in that, also it is preset with Dblink monitoring modules pair Answer the Dblink blacklists of different databases to be visited;After current Dblink is judged as doubtful illegal Dblink, Dblink Monitoring module also judges whether the doubtful illegal Dblink is contained in Dblink blacklists, if then terminating to monitor, output is accused Alert information, if otherwise transmitting corresponding doubtful illegal Dblink warning information to warning processing module;
Warning processing module will consider that practical application needs not allow the Dblink for accessing database to be checked still, add black name It is single.
CN201711225398.9A 2017-11-29 2017-11-29 A kind of Dblink monitoring method and monitoring system Pending CN107832634A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711225398.9A CN107832634A (en) 2017-11-29 2017-11-29 A kind of Dblink monitoring method and monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711225398.9A CN107832634A (en) 2017-11-29 2017-11-29 A kind of Dblink monitoring method and monitoring system

Publications (1)

Publication Number Publication Date
CN107832634A true CN107832634A (en) 2018-03-23

Family

ID=61646388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711225398.9A Pending CN107832634A (en) 2017-11-29 2017-11-29 A kind of Dblink monitoring method and monitoring system

Country Status (1)

Country Link
CN (1) CN107832634A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543764A (en) * 2018-11-28 2019-03-29 安徽省公共气象服务中心 A kind of warning information legitimacy detection method and detection system based on intelligent semantic perception
CN110913179A (en) * 2019-12-02 2020-03-24 北京志成合创信息技术有限公司 Intelligent management and control method, device, equipment and storage medium for video monitoring equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226497A (en) * 2007-12-10 2008-07-23 金蝶软件(中国)有限公司 Application program monitoring system and monitoring method
CN103034679A (en) * 2012-11-14 2013-04-10 上海百事通信息技术有限公司 Monitoring system for java operational database
CN104063473A (en) * 2014-06-30 2014-09-24 江苏华大天益电力科技有限公司 Database auditing monitoring system and database auditing monitoring method
CN104699735A (en) * 2014-11-20 2015-06-10 国家电网公司 Data processing method and device for enterprise data center
CN105468619A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 Resource distribution method and device used for database connection pool

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226497A (en) * 2007-12-10 2008-07-23 金蝶软件(中国)有限公司 Application program monitoring system and monitoring method
CN103034679A (en) * 2012-11-14 2013-04-10 上海百事通信息技术有限公司 Monitoring system for java operational database
CN104063473A (en) * 2014-06-30 2014-09-24 江苏华大天益电力科技有限公司 Database auditing monitoring system and database auditing monitoring method
CN105468619A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 Resource distribution method and device used for database connection pool
CN104699735A (en) * 2014-11-20 2015-06-10 国家电网公司 Data processing method and device for enterprise data center

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李波: "《计算机应用基础》", 31 July 2012, 航空工业出版社 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543764A (en) * 2018-11-28 2019-03-29 安徽省公共气象服务中心 A kind of warning information legitimacy detection method and detection system based on intelligent semantic perception
CN110913179A (en) * 2019-12-02 2020-03-24 北京志成合创信息技术有限公司 Intelligent management and control method, device, equipment and storage medium for video monitoring equipment

Similar Documents

Publication Publication Date Title
EP3111433B1 (en) Wireless sensor network
CN106295355B (en) A kind of active safety support method towards Linux server
CN106101130A (en) A kind of network malicious data detection method, Apparatus and system
CN108039016A (en) A kind of subway underground operation space safety monitoring and early warning system
CN106330852A (en) Abnormality prediction method, abnormality prediction system, and abnormality prediction device
CN107832634A (en) A kind of Dblink monitoring method and monitoring system
CN112419130B (en) Emergency response system and method based on network security monitoring and data analysis
CN109411073A (en) Medical data integrated system
CN101458667B (en) Electronic apparatus with electronic security level identification, information exchange flow control system based on electronic security level identification, method and mobile memory
Tasali et al. A flexible authorization architecture for systems of interoperable medical devices
US7805734B2 (en) Platform management of high-availability computer systems
CN108390778A (en) A kind of computer network security prior-warning device
CN109753819A (en) A kind for the treatment of method and apparatus of access control policy
CN108270798A (en) A kind of mobile terminal device safety management system
CN107612755A (en) The management method and its device of a kind of cloud resource
CN112910657B (en) Cloud security token early warning system
CN109753803A (en) A kind of secure virtual machine management system
Patel et al. 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework
Jiang et al. Dependable integrated clinical system architecture with runtime verification
CN106230614A (en) Log in fault and automatically monitor restorative procedure, system and information system for power enterprise
CN110519213A (en) Filter method, device, equipment and the computer readable storage medium of interior message
Akaichi Semantic Technology based Usage Control for Decentralized Systems
CN207083113U (en) A kind of security monitoring device of medical network
Briland Addressing false data injection attacks in iot systems with a domain specific language within an industrial context
CN107124328A (en) Start the method and apparatus of arbitration machine in a kind of Net Strobe System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180323