2021年《信息安全与通信保密》总目次

2021-04-04 06:40
信息安全与通信保密 2021年12期
关键词:数据安全网络空间网络安全

专 题

探索区块链生态行业新方向

政务数据资源共享是区块链技术自主创新的主战场 ···················································霍 炜1(2)

区块链在数字金融技术体系中的发展与挑战 ························································狄 刚1(14)

基于区块链的数据共享解决方案 ··········································白 健,董贵山,安红章,廖思捷1(21)

区块链的应用:安全威胁与解决策略 ······························································刘宗妹1(32)

公检法基于区块链和大数据共建证据链 ····································曾 超,杜新胜,郑聪艺,章婉仙1(42)

完善个人信息保护体制的顶层设计

《个人信息保护法(草案)》的立法评析与完善思考 ·········································黄道丽,胡文华2(2)

探索个人数据保护的中国方案 ····································································王 融2(10)

个人信息保护立法面临的两难选择 ································································王新锐2(15)

基于数据运营安全的个人信息保护 ································································王文宇2(21)

经济学视野下的隐私问题简析 ····································································陈永伟2(29)

网络空间全球治理的新格局

疫情与变局之下的网络空间国际治理态势 ···························································李 艳3(2)

全球数字地缘版图初现端倪 ······································································· 郎 平3(9)

2020数字冷战元年:网络空间全球治理的两种路线之争 ·············································· 徐培喜3(16)

美国网络威慑面临困境及对网络空间全球治理的影响 ········································赵子鹏,张 静3(24)

2020年“战略自主”框架下的欧洲数字主权建设全面提速 ············································汪 丽3(31)

基于第二个“金色十年”背景下的金砖国家网络空间治理合作探究 ····································刘 昱3(38)

网络作战力量建设研究

英国网络作战力量浅析 ···························································曾 杰,罗艳华,郝志超4(2)

俄罗斯网络战发展研究 ···························································李奇志,唐文章,吕 玮4(9)

印度网络空间作战力量研究 ······················································吕 玮,万 兵,龚汉卿4(17)

解析以色列网络空间作战力量 ····················································郝志超,陈 河,龚汉卿4(26)

伊朗网络战能力研究 ····························································龚汉卿,张运雄,郝志超4(35)

人工智能技术与全球安全挑战

人工智能技术与全球政治安全挑战 ·································································封 帅5(2)

人工智能对国家经济安全的影响研究 ······························································戢仕铭5(10)

人工智能给军事安全带来的机遇与挑战 ····················································文力浩,龙 坤5(18)

新局与危局:人工智能的国家安全问题思辨 ························································张纪腾5(27)

人工智能时代的俄罗斯国家安全 ··································································华 盾5(33)

政务信息共享数据安全研究

政务信息共享数据安全国家标准的应用实践研究 ·····················································罗海宁6(2)

详解政务信息共享数据安全国家标准 ······························································焦 迪6(11)

政务信息共享数据安全中的密码支撑技术与应用 ············································杨 晶,周海鑫6(16)

基于国家标准要求的政务数据共享安全架构研究 ············································周健雄,梁 孟6(24)

数据时代的数据安全治理探索

全球数据安全:认知、政策与实践 ·········································李 艳,章时雨,季媛媛,韩 昱7(2)

全球数据治理:态势辨析与趋势展望 ······················································胡正坤,郭 丰7(11)

论数据流通的治理机制 ··········································································谢永江7(19)

网络平台治理中的生物识别信息保护 ······················································田 丽,毕 昆7(28)

跨境打击网络犯罪中的公私合作 ··································································裴 炜7(37)

网络安全漏洞管理的路径探索

数据安全法视野下的网络安全漏洞管理 ·····················································朱莉欣,陈 伟8(2)

合作主义:网络安全漏洞治理的范式转型 ···························································郑丁灏8(9)

构建漏洞管理国际合作机制的思考和建议 ··························································许蔓舒8(17)

基于漏洞管理推动网络军控实践的思考 ····························································赵子鹏8(24)

漏洞多方协同披露机制研究 ······································································张 静8(31)

未成年人网络保护

未成年人数字安全保护的问题与对策:切入点与落脚点 ·······································阚馨仪,杜智涛9(2)

理论与实践:以未成年人需求为核心的网络保护 ····················································韩 昱9(10)

潜藏在屏幕另侧的触手与凝视——防范未成年人网络性侵害呼吁多方共治 ······················董晓梦,满运玖9(18)

基于移动互联网应用的儿童网络保护产业实践与完善 ········································戴俊哲,李阳阳9(27)

从敌视到鼓励:欧盟未成年人网络使用研究范式转移 ········································田 丽,方诗敏9(34)

网络空间大国战略互动的新趋势

警惕美俄竞争下的网络空间“阿富汗化” ··········································赵子鹏,杨胜利,张 奇10(2)

拜登政府网络安全政策观察 ······································································桂畅旎10(9)

欧盟安全联盟战略分析 ·········································································孙伟意10(17)

新版国家安全战略与俄罗斯网络空间安全部署 ·····················································汪 丽10(23)

俄罗斯信息安全战略态势变化分析 ·······························································章时雨10(30)

数字信任与数据安全

我国数据跨境流动相关举措分析 ····················································刘耀华11(2)

个人信息保护法解读:企业合规要求与义务履行 ············································高轶峰,张楠驰11(9)

个人信息保护法解读:常见合规场景与应对 ···············································施建俊,王 瑾11(19)

全球数字信任建设的现状、问题与经验 ···················································崔久强,陈晓曈11(30)

数据隐私与数字主权:欧盟关于公共场所人脸识别禁令的深层考量 ···································韩 昱11(39)

中国数字安全治理探析 ·········································································顾 璨11(48)

数字时代的国家安全

数字空间的大国博弈笔谈 ················································许蔓舒,桂畅旎,刘杨钺,汪 丽12(2)

数字空间国际规则建构笔谈 ·····························································郎 平,李 艳12(17)

新兴技术对国家安全的影响笔谈 ·················································封 帅,王天禅,蒋旭栋12(24)

产业观察

行稳致远 不负韶华满山花——访格尔软件股份有限公司总裁杨文山 ··························唐 莉,王 超1(48)

云测试是未来趋势——访北京云测信息技术有限公司合伙人及CMO张鹏飞 ·····························王 超1(56)

我们准备好进入人体网络时代了吗?——访卡尔顿大学传播与媒体研究专业博士塔玛拉·班伯里 ······道格·欧文2(36)

持续创新赢得市场 执着技术改变世界——访三未信安科技股份有限公司董事长兼总经理张岳公 ··············································································································唐 莉,王翠玉2(39)

网络空间的发展和应对——访美国网络司令部司令、国家情报局局长和中央安全局局长保罗·M·中曾根 ········································································································ 联合部队季刊3(45)

以担责之心“折腾” 用精进技术安众——访北京众安天下科技有限公司总经理杨蔚 ····················王 超3(51)

技术信仰者行千里汇江海 终成可持续安全——访山石网科通信技术股份有限公司董事长罗东平 ·······················

·······················································································唐 莉,王翠玉4(44)

坚持专业稳固根基 聚焦密码乘风远航——访北京江南天安科技有限公司总经理邓小四 ··········唐 莉,王翠玉4(52)

利用人工智能促进国家安全——访美国国防部联合人工智能中心首席技术官南德·穆尔坎丹尼 ··············································································································卡伦·库特基维茨5(40)

在价值坚守中向变而生——访广州凌晨网络科技有限公司创始人姚威 ··································王 超5(43)

以《标准》为根基 保障政务数据安全共享—— 访国家电子政务外网管理中心办公室副主任徐春学············································································································唐 莉,王 超6(32)

强化数据管理 保障政务信息安全——访湖南省人民政府发展研究中心总工程师柳松 ············唐 莉,王 超6(36)

网络战争的未来—— 访国际战略研究所高级研究员格雷格·奥斯汀 ······························埃德·斯泰西7(46)

探索和构建加密流量安全防御和治理体系——访北京观成科技有限公司联合创始人于海东 ················王 超7(51)

格鲁吉亚内政部国际关系司起草网络犯罪政策的有关工作——访格鲁吉亚内政部国际关系司项目管理处重案检查员阿纳

诺·格里加拉什维利 ································································网络犯罪方案办公室8(39)

构建覆盖数据全生命周期的安全治理体系——访杭州安恒信息技术股份有限公司首席科学家、高级副总裁刘博 ··········································································································王 超8(42)

开放计算项目——访英特尔战略执行部副总裁兼总经理丽贝卡·威克利 ························伊恩·库特雷斯9(45)

着力数据安全治理 应对数据安全威胁挑战——访深圳昂楷科技有限公司副总经理李四阶 ················王 超9(51)

人生就是无数偶然之后的必然——访某金融科技公司信息安全专家蔚晨 ·······························安 在10(39)

用“智能”代替“规则” 构建“实战化”安全攻防体系——访北京长亭科技有限公司副总裁崔勤 ·······王 超10(46)

重新构想商业——访微软公司首席执行官萨提亚·纳德拉 ·····································约翰·桑希尔11(57)

开启自主信息产业生态建设的新征程——访龙芯中科技术股份有限公司董事长胡伟武 ···················王 超11(61)

人为错误是导致数据泄露的首要原因——访网络安全专家保拉·亚努科维奇 ·························Boxcryptor12(36)

构建数据安全综合治理体系——访北京天空卫士网络安全技术有限公司合伙人杨明非 ···················王 超12(40)

海外报告

量子计算与密码学分析、风险与对决策者的建议 ··············································杰克·蒂贝茨1(61)

人脸识别技术——设计保护隐私和防止偏见的系统 ····················································································杨·道格拉斯,丽贝卡·巴拉贝卡,卡洛斯·伊格纳西奥·古铁雷斯,迈克尔·查科夫斯基2(45)

面向拜登政府的过渡期网络安全建议 ············································美国网络空间日光浴委员会3(56)

2020年网络威胁报告——隐蔽或带有噪声的网络攻击使检测复杂化 ································埃森哲公司4(57)

人工智能与国际稳定——风险和建立信任措施 ································迈克尔·霍洛维兹,保罗·沙尔5(49)

共同的准则——技术政策的联盟框架 ········································································································马蒂恩·拉塞尔,丽贝卡·阿塞萨蒂,新·奥亚,艾尼基·里科宁,莫尼卡·博切6(42)

网络安全中的大数据治理 ········································杨隆志,李 洁,诺伊莉莎,汤姆·皮克特7(56)

武器系统网络安全:国防部借助指南来更好地与承包商沟通项目要求(译文) ···························································································美国政府问责署/张 玲,罗 仙,杨晓姣,刘力平,译8(48)

网络能力与国家实力:网络评估(译文) ··················································国际战略研究所9(56)

FM 3-12:网络空间作战与电磁战(译文) ················································美国陆军部总部10(51)

下一代国家信息作战战略和架构(译文) ···················································杰克·基斯勒11(66)

韩国数据治理方式:世界在线率最高国家如何打造第三条道路(译文) ·······卡内基国际和平基金会/郑乐锋 译12(45)

伊朗威胁行为体活动的发展趋势(译文)——微软威胁情报中心在2021年网络战争大会上的演讲 ··········································································································微软威胁情报中心12(54)

学术争鸣

有关构建政务信息系统密码应用管理体系的建议 ····················································焦 迪1(70)

基于网络社交的开源情报研究与应用 ······················································漆世钱,孟春宁1(77)

零信任落地路径研究 ····························································秦益飞,张英涛,张晓东1(84)

合规与实战推动密码产业发展 ····································································白小勇1(92)

人工智能军事应用及其国际法问题 ························································李 享,罗天宇1(99)

量子保密通信标准体系建设 ······························································程广明,郭邦红2(54)

面向多处理器的内网计算机BIOS口令集中管理机制研究 ·····孙 亮,陈小春,鲍天明,王 博,任 彤,汤大鹏2(63)

架空输电线路巡检无人机航拍图像硬件加密方法 ····················王 坤,匡文凯,林 楠,杨 浩,苏 盛2(75)

人工免疫系统的研究进展与展望 ·················································· 蒋亚平,张安康,黎 星2(83)

一种基于数据分析的网络安全态势感知系统设计与实现 ······························周荣娟,李 伟,李晓花2(93)

洛克希德·马丁公司网络军工产业研究 ············································刘 栋,尹 晗,胡春卉3(73)

奥巴马和特朗普时期美国网络安全战略体制研究对我国的启示 ········廖蓓蓓,邢 松,孟繁瑞,冀 冰,于进洲3(83)

2020年美国网络空间战略概览与分析 ······································罗 仙,胡春卉,张 玲,魏洪宽3(91)

暗网取证研究 ··································································苏再添,张莹莹,黄志炜3(99)

网络空间安全视域下的美国选举安全 ······························································王守都4(66)

基于区块链技术的电子数据证据共享平台研究 ······································杨卫军,董立波,王 平4(77)

大力开展数据安全合规性评估为数字经济发展保驾护航 ······································张琳琳,李晓伟4(84)

构建基于过程方法的公安情报产品质量管理体系的研究 ··············································吴子丰4(91)

美国关键信息基础设施网络安全改进框架及实施研究 ································陈红松,黄海峰,李蔚欣5(59)

中央银行数字货币研究:原型系统与技术解决方案 ··································吴 狄,刘 亚,柏语蔓5(69)

私有云安全云管平台关键技术与应用研究 ··········································王树太,吴 庆,王 振5(85)

智媒体的业务中台建设 ··························································余 欣,王子建,徐桢虎5(94)

云的等级保护 ·········································································赵尚伟,陆宝华5(104)

自主身份理念与关键要素分析 ···················································景 越,李婧璇,刘卫卫5(112)

关键信息基础设施安全检查 ······················································王 娟,陈 爽,张景明6(52)

数字经济时代密码应用思考 ······································································魏洪宽6(60)

自安全网络,助力网络原生自安全 ························································俞哲伟,刘书超6(68)

医学院校教师备课系统的信息安全性研究 ··································韩 婷,董 默,宋 欣,刘 畅6(76)

人脸识别技术应用与限制研究 ····························································唐 莉,王 克6(82)

密码应用创新助力政务信息化建设 ········································张文科,敖 麒,罗 影,冷昌琦7(67)

美欧《隐私盾协议》之无效及中国应对路径 ························································肖 雄7(76)

云平台IaaS层内生安全技术研究 ··································尚 旭,刘晓毅,冯中华,崔 阳,金 鑫7(85)

内生安全SD-WAN网络架构与关键设备方案研究 ···················································康 敏7(95)

一种基于SRAM工艺FPGA的防克隆保护方法 ·····················刘 贺,刘 瑶,杨 竞,王小骥,刘星江7(105)

智慧电力网络安全态势感知能力建设与提升——数据驱动从传统运维转型智慧运维 ······卢士达,金玲丽,姚亦凡8(60)

区块链权益证明共识机制综述 ····························································柏语蔓,于莲芝8(68)

大数据环境安全稽查与风险评估系统研究 ··································王邦礼,冯中华,赵思宇,尚 旭8(82)

政务信息系统云化迁移过程的信息安全和保密管理研究 ······································刘 颖,王永刚8(90)

基于深度学习的入侵检测系统综述 ················································叶 倩,谭 天,孙艳杰8(96)

网络攻击技术分层方法研究 ······················································易 涛,葛维静,邓 曦9(74)

海南自贸港商用密码应用发展SWOT分析 ··················郭晓黎,董贵山,贾儒鹏,张小琼,张远云,林俊燕9(83)

欧盟人工智能立法提案的核心思想及未来影响分析 ··································邱惠君,梁冬晗,李 凯9(92)

区块链在网络信任体系中的应用研究 ·····················································韩 璇,刘 岵9(100)

智慧移动警务统一认证模式研究 ·································································陈 骁9(115)

政务数据共享授权决策模型研究 ·································································马 英10(67)

商用密码模块接口统一调用技术研究 ·····················································宣兆新,马 旭10(75)

工业物联网蓝牙安全及基于标识算法的分布式鉴权技术研究 ·········李 延,耿震磊,袁艳芳,张 磊,杨 峰10(82)

大国竞争时代美国着力打击社交媒体上的外国虚假信息 ·····································李艳霄,李晓绚10(92)

数字经济时代工业互联网网络安全国际标准研究及启示 ·············································程 媛10(98)

基于分类分级的个人信息保护 ··································································何维群10(107)

网络空间对抗防御中的智能监测技术研究 ·························郭世泽,王小娟,何明枢,任传伦,俞赛赛11(79)

基于区块链的工业数据交互可信验证研究与应用 ···································谭源泉,康红娟,唐 博11(95)

基于大数据技术的攻击溯源研究 ················································王 涛,张 淋,邹初建11(106)

从美国最新国防预算文件看网络空间发展新动向 ··························罗 仙,张 玲,庞 浩,钟一冉11(117)

空管自动化系统等保测评实践与安全防护技术研究 ················································郭金亮11(126)

军工单位涉密网中信息导出的安全风险分析 ······················································陈 刚11(136)

美国网络外交的政策演变、组织体系及发展趋势 ···········································李 艳,孙宝云12(59)

网络安全和信息化与战略管理之问题思考 ·········································鲁 冰,黄付庆,王 军12(70)

基于商用密码技术的铁路行业统计调查系统安全研究 ···············································陆 铖12(77)

信道加密设备与网络加密设备差异性研究和运维保障管理 ···················刘俊杰,周 勇,邱海彬,闫雪强12(85)

猜你喜欢
数据安全网络空间网络安全
共建诚实守信网络空间
云计算中基于用户隐私的数据安全保护方法
网络安全
网络安全人才培养应“实战化”
网络空间并非“乌托邦”
建立激励相容机制保护数据安全
上网时如何注意网络安全?
大数据云计算环境下的数据安全
网络空间安全人才培养探讨
大数据安全搜索与共享