專 題
探索區塊鏈生態行業新方向
政務數據資源共享是區塊鏈技術自主創新的主戰場 ···················································霍 煒1(2)
區塊鏈在數字金融技術體系中的發展與挑戰 ························································狄 剛1(14)
基于區塊鏈的數據共享解決方案 ··········································白 健,董貴山,安紅章,廖思捷1(21)
區塊鏈的應用:安全威脅與解決策略 ······························································劉宗妹1(32)
公檢法基于區塊鏈和大數據共建證據鏈 ····································曾 超,杜新勝,鄭聰藝,章婉仙1(42)
完善個人信息保護體制的頂層設計
《個人信息保護法(草案)》的立法評析與完善思考 ·········································黃道麗,胡文華2(2)
探索個人數據保護的中國方案 ····································································王 融2(10)
個人信息保護立法面臨的兩難選擇 ································································王新銳2(15)
基于數據運營安全的個人信息保護 ································································王文宇2(21)
經濟學視野下的隱私問題簡析 ····································································陳永偉2(29)
網絡空間全球治理的新格局
疫情與變局之下的網絡空間國際治理態勢 ···························································李 艷3(2)
全球數字地緣版圖初現端倪 ······································································· 郎 平3(9)
2020數字冷戰元年:網絡空間全球治理的兩種路線之爭 ·············································· 徐培喜3(16)
美國網絡威懾面臨困境及對網絡空間全球治理的影響 ········································趙子鵬,張 靜3(24)
2020年“戰略自主”框架下的歐洲數字主權建設全面提速 ············································汪 麗3(31)
基于第二個“金色十年”背景下的金磚國家網絡空間治理合作探究 ····································劉 昱3(38)
網絡作戰力量建設研究
英國網絡作戰力量淺析 ···························································曾 杰,羅艷華,郝志超4(2)
俄羅斯網絡戰發展研究 ···························································李奇志,唐文章,呂 瑋4(9)
印度網絡空間作戰力量研究 ······················································呂 瑋,萬 兵,龔漢卿4(17)
解析以色列網絡空間作戰力量 ····················································郝志超,陳 河,龔漢卿4(26)
伊朗網絡戰能力研究 ····························································龔漢卿,張運雄,郝志超4(35)
人工智能技術與全球安全挑戰
人工智能技術與全球政治安全挑戰 ·································································封 帥5(2)
人工智能對國家經濟安全的影響研究 ······························································戢仕銘5(10)
人工智能給軍事安全帶來的機遇與挑戰 ····················································文力浩,龍 坤5(18)
新局與危局:人工智能的國家安全問題思辨 ························································張紀騰5(27)
人工智能時代的俄羅斯國家安全 ··································································華 盾5(33)
政務信息共享數據安全研究
政務信息共享數據安全國家標準的應用實踐研究 ·····················································羅海寧6(2)
詳解政務信息共享數據安全國家標準 ······························································焦 迪6(11)
政務信息共享數據安全中的密碼支撐技術與應用 ············································楊 晶,周海鑫6(16)
基于國家標準要求的政務數據共享安全架構研究 ············································周健雄,梁 孟6(24)
數據時代的數據安全治理探索
全球數據安全:認知、政策與實踐 ·········································李 艷,章時雨,季媛媛,韓 昱7(2)
全球數據治理:態勢辨析與趨勢展望 ······················································胡正坤,郭 豐7(11)
論數據流通的治理機制 ··········································································謝永江7(19)
網絡平臺治理中的生物識別信息保護 ······················································田 麗,畢 昆7(28)
跨境打擊網絡犯罪中的公私合作 ··································································裴 煒7(37)
網絡安全漏洞管理的路徑探索
數據安全法視野下的網絡安全漏洞管理 ·····················································朱莉欣,陳 偉8(2)
合作主義:網絡安全漏洞治理的范式轉型 ···························································鄭丁灝8(9)
構建漏洞管理國際合作機制的思考和建議 ··························································許蔓舒8(17)
基于漏洞管理推動網絡軍控實踐的思考 ····························································趙子鵬8(24)
漏洞多方協同披露機制研究 ······································································張 靜8(31)
未成年人網絡保護
未成年人數字安全保護的問題與對策:切入點與落腳點 ·······································闞馨儀,杜智濤9(2)
理論與實踐:以未成年人需求為核心的網絡保護 ····················································韓 昱9(10)
潛藏在屏幕另側的觸手與凝視——防范未成年人網絡性侵害呼吁多方共治 ······················董曉夢,滿運玖9(18)
基于移動互聯網應用的兒童網絡保護產業實踐與完善 ········································戴俊哲,李陽陽9(27)
從敵視到鼓勵:歐盟未成年人網絡使用研究范式轉移 ········································田 麗,方詩敏9(34)
網絡空間大國戰略互動的新趨勢
警惕美俄競爭下的網絡空間“阿富汗化” ··········································趙子鵬,楊勝利,張 奇10(2)
拜登政府網絡安全政策觀察 ······································································桂暢旎10(9)
歐盟安全聯盟戰略分析 ·········································································孫偉意10(17)
新版國家安全戰略與俄羅斯網絡空間安全部署 ·····················································汪 麗10(23)
俄羅斯信息安全戰略態勢變化分析 ·······························································章時雨10(30)
數字信任與數據安全
我國數據跨境流動相關舉措分析 ····················································劉耀華11(2)
個人信息保護法解讀:企業合規要求與義務履行 ············································高軼峰,張楠馳11(9)
個人信息保護法解讀:常見合規場景與應對 ···············································施建俊,王 瑾11(19)
全球數字信任建設的現狀、問題與經驗 ···················································崔久強,陳曉曈11(30)
數據隱私與數字主權:歐盟關于公共場所人臉識別禁令的深層考量 ···································韓 昱11(39)
中國數字安全治理探析 ·········································································顧 璨11(48)
數字時代的國家安全
數字空間的大國博弈筆談 ················································許蔓舒,桂暢旎,劉楊鉞,汪 麗12(2)
數字空間國際規則建構筆談 ·····························································郎 平,李 艷12(17)
新興技術對國家安全的影響筆談 ·················································封 帥,王天禪,蔣旭棟12(24)
產業觀察
行穩致遠 不負韶華滿山花——訪格爾軟件股份有限公司總裁楊文山 ··························唐 莉,王 超1(48)
云測試是未來趨勢——訪北京云測信息技術有限公司合伙人及CMO張鵬飛 ·····························王 超1(56)
我們準備好進入人體網絡時代了嗎?——訪卡爾頓大學傳播與媒體研究專業博士塔瑪拉·班伯里 ······道格·歐文2(36)
持續創新贏得市場 執著技術改變世界——訪三未信安科技股份有限公司董事長兼總經理張岳公 ··············································································································唐 莉,王翠玉2(39)
網絡空間的發展和應對——訪美國網絡司令部司令、國家情報局局長和中央安全局局長保羅·M·中曾根 ········································································································ 聯合部隊季刊3(45)
以擔責之心“折騰” 用精進技術安眾——訪北京眾安天下科技有限公司總經理楊蔚 ····················王 超3(51)
技術信仰者行千里匯江海 終成可持續安全——訪山石網科通信技術股份有限公司董事長羅東平 ·······················
·······················································································唐 莉,王翠玉4(44)
堅持專業穩固根基 聚焦密碼乘風遠航——訪北京江南天安科技有限公司總經理鄧小四 ··········唐 莉,王翠玉4(52)
利用人工智能促進國家安全——訪美國國防部聯合人工智能中心首席技術官南德·穆爾坎丹尼 ··············································································································卡倫·庫特基維茨5(40)
在價值堅守中向變而生——訪廣州凌晨網絡科技有限公司創始人姚威 ··································王 超5(43)
以《標準》為根基 保障政務數據安全共享—— 訪國家電子政務外網管理中心辦公室副主任徐春學············································································································唐 莉,王 超6(32)
強化數據管理 保障政務信息安全——訪湖南省人民政府發展研究中心總工程師柳松 ············唐 莉,王 超6(36)
網絡戰爭的未來—— 訪國際戰略研究所高級研究員格雷格·奧斯汀 ······························埃德·斯泰西7(46)
探索和構建加密流量安全防御和治理體系——訪北京觀成科技有限公司聯合創始人于海東 ················王 超7(51)
格魯吉亞內政部國際關系司起草網絡犯罪政策的有關工作——訪格魯吉亞內政部國際關系司項目管理處重案檢查員阿納
諾·格里加拉什維利 ································································網絡犯罪方案辦公室8(39)
構建覆蓋數據全生命周期的安全治理體系——訪杭州安恒信息技術股份有限公司首席科學家、高級副總裁劉博 ··········································································································王 超8(42)
開放計算項目——訪英特爾戰略執行部副總裁兼總經理麗貝卡·威克利 ························伊恩·庫特雷斯9(45)
著力數據安全治理 應對數據安全威脅挑戰——訪深圳昂楷科技有限公司副總經理李四階 ················王 超9(51)
人生就是無數偶然之后的必然——訪某金融科技公司信息安全專家蔚晨 ·······························安 在10(39)
用“智能”代替“規則” 構建“實戰化”安全攻防體系——訪北京長亭科技有限公司副總裁崔勤 ·······王 超10(46)
重新構想商業——訪微軟公司首席執行官薩提亞·納德拉 ·····································約翰·桑希爾11(57)
開啟自主信息產業生態建設的新征程——訪龍芯中科技術股份有限公司董事長胡偉武 ···················王 超11(61)
人為錯誤是導致數據泄露的首要原因——訪網絡安全專家保拉·亞努科維奇 ·························Boxcryptor12(36)
構建數據安全綜合治理體系——訪北京天空衛士網絡安全技術有限公司合伙人楊明非 ···················王 超12(40)
海外報告
量子計算與密碼學分析、風險與對決策者的建議 ··············································杰克·蒂貝茨1(61)
人臉識別技術——設計保護隱私和防止偏見的系統 ····················································································楊·道格拉斯,麗貝卡·巴拉貝卡,卡洛斯·伊格納西奧·古鐵雷斯,邁克爾·查科夫斯基2(45)
面向拜登政府的過渡期網絡安全建議 ············································美國網絡空間日光浴委員會3(56)
2020年網絡威脅報告——隱蔽或帶有噪聲的網絡攻擊使檢測復雜化 ································埃森哲公司4(57)
人工智能與國際穩定——風險和建立信任措施 ································邁克爾·霍洛維茲,保羅·沙爾5(49)
共同的準則——技術政策的聯盟框架 ········································································································馬蒂恩·拉塞爾,麗貝卡·阿塞薩蒂,新·奧亞,艾尼基·里科寧,莫尼卡·博切6(42)
網絡安全中的大數據治理 ········································楊隆志,李 潔,諾伊莉莎,湯姆·皮克特7(56)
武器系統網絡安全:國防部借助指南來更好地與承包商溝通項目要求(譯文) ···························································································美國政府問責署/張 玲,羅 仙,楊曉姣,劉力平,譯8(48)
網絡能力與國家實力:網絡評估(譯文) ··················································國際戰略研究所9(56)
FM 3-12:網絡空間作戰與電磁戰(譯文) ················································美國陸軍部總部10(51)
下一代國家信息作戰戰略和架構(譯文) ···················································杰克·基斯勒11(66)
韓國數據治理方式:世界在線率最高國家如何打造第三條道路(譯文) ·······卡內基國際和平基金會/鄭樂鋒 譯12(45)
伊朗威脅行為體活動的發展趨勢(譯文)——微軟威脅情報中心在2021年網絡戰爭大會上的演講 ··········································································································微軟威脅情報中心12(54)
學術爭鳴
有關構建政務信息系統密碼應用管理體系的建議 ····················································焦 迪1(70)
基于網絡社交的開源情報研究與應用 ······················································漆世錢,孟春寧1(77)
零信任落地路徑研究 ····························································秦益飛,張英濤,張曉東1(84)
合規與實戰推動密碼產業發展 ····································································白小勇1(92)
人工智能軍事應用及其國際法問題 ························································李 享,羅天宇1(99)
量子保密通信標準體系建設 ······························································程廣明,郭邦紅2(54)
面向多處理器的內網計算機BIOS口令集中管理機制研究 ·····孫 亮,陳小春,鮑天明,王 博,任 彤,湯大鵬2(63)
架空輸電線路巡檢無人機航拍圖像硬件加密方法 ····················王 坤,匡文凱,林 楠,楊 浩,蘇 盛2(75)
人工免疫系統的研究進展與展望 ·················································· 蔣亞平,張安康,黎 星2(83)
一種基于數據分析的網絡安全態勢感知系統設計與實現 ······························周榮娟,李 偉,李曉花2(93)
洛克希德·馬丁公司網絡軍工產業研究 ············································劉 棟,尹 晗,胡春卉3(73)
奧巴馬和特朗普時期美國網絡安全戰略體制研究對我國的啟示 ········廖蓓蓓,邢 松,孟繁瑞,冀 冰,于進洲3(83)
2020年美國網絡空間戰略概覽與分析 ······································羅 仙,胡春卉,張 玲,魏洪寬3(91)
暗網取證研究 ··································································蘇再添,張瑩瑩,黃志煒3(99)
網絡空間安全視域下的美國選舉安全 ······························································王守都4(66)
基于區塊鏈技術的電子數據證據共享平臺研究 ······································楊衛軍,董立波,王 平4(77)
大力開展數據安全合規性評估為數字經濟發展保駕護航 ······································張琳琳,李曉偉4(84)
構建基于過程方法的公安情報產品質量管理體系的研究 ··············································吳子豐4(91)
美國關鍵信息基礎設施網絡安全改進框架及實施研究 ································陳紅松,黃海峰,李蔚欣5(59)
中央銀行數字貨幣研究:原型系統與技術解決方案 ··································吳 狄,劉 亞,柏語蔓5(69)
私有云安全云管平臺關鍵技術與應用研究 ··········································王樹太,吳 慶,王 振5(85)
智媒體的業務中臺建設 ··························································余 欣,王子建,徐楨虎5(94)
云的等級保護 ·········································································趙尚偉,陸寶華5(104)
自主身份理念與關鍵要素分析 ···················································景 越,李婧璇,劉衛衛5(112)
關鍵信息基礎設施安全檢查 ······················································王 娟,陳 爽,張景明6(52)
數字經濟時代密碼應用思考 ······································································魏洪寬6(60)
自安全網絡,助力網絡原生自安全 ························································俞哲偉,劉書超6(68)
醫學院校教師備課系統的信息安全性研究 ··································韓 婷,董 默,宋 欣,劉 暢6(76)
人臉識別技術應用與限制研究 ····························································唐 莉,王 克6(82)
密碼應用創新助力政務信息化建設 ········································張文科,敖 麒,羅 影,冷昌琦7(67)
美歐《隱私盾協議》之無效及中國應對路徑 ························································肖 雄7(76)
云平臺IaaS層內生安全技術研究 ··································尚 旭,劉曉毅,馮中華,崔 陽,金 鑫7(85)
內生安全SD-WAN網絡架構與關鍵設備方案研究 ···················································康 敏7(95)
一種基于SRAM工藝FPGA的防克隆保護方法 ·····················劉 賀,劉 瑤,楊 競,王小驥,劉星江7(105)
智慧電力網絡安全態勢感知能力建設與提升——數據驅動從傳統運維轉型智慧運維 ······盧士達,金玲麗,姚亦凡8(60)
區塊鏈權益證明共識機制綜述 ····························································柏語蔓,于蓮芝8(68)
大數據環境安全稽查與風險評估系統研究 ··································王邦禮,馮中華,趙思宇,尚 旭8(82)
政務信息系統云化遷移過程的信息安全和保密管理研究 ······································劉 穎,王永剛8(90)
基于深度學習的入侵檢測系統綜述 ················································葉 倩,譚 天,孫艷杰8(96)
網絡攻擊技術分層方法研究 ······················································易 濤,葛維靜,鄧 曦9(74)
海南自貿港商用密碼應用發展SWOT分析 ··················郭曉黎,董貴山,賈儒鵬,張小瓊,張遠云,林俊燕9(83)
歐盟人工智能立法提案的核心思想及未來影響分析 ··································邱惠君,梁冬晗,李 凱9(92)
區塊鏈在網絡信任體系中的應用研究 ·····················································韓 璇,劉 岵9(100)
智慧移動警務統一認證模式研究 ·································································陳 驍9(115)
政務數據共享授權決策模型研究 ·································································馬 英10(67)
商用密碼模塊接口統一調用技術研究 ·····················································宣兆新,馬 旭10(75)
工業物聯網藍牙安全及基于標識算法的分布式鑒權技術研究 ·········李 延,耿震磊,袁艷芳,張 磊,楊 峰10(82)
大國競爭時代美國著力打擊社交媒體上的外國虛假信息 ·····································李艷霄,李曉絢10(92)
數字經濟時代工業互聯網網絡安全國際標準研究及啟示 ·············································程 媛10(98)
基于分類分級的個人信息保護 ··································································何維群10(107)
網絡空間對抗防御中的智能監測技術研究 ·························郭世澤,王小娟,何明樞,任傳倫,俞賽賽11(79)
基于區塊鏈的工業數據交互可信驗證研究與應用 ···································譚源泉,康紅娟,唐 博11(95)
基于大數據技術的攻擊溯源研究 ················································王 濤,張 淋,鄒初建11(106)
從美國最新國防預算文件看網絡空間發展新動向 ··························羅 仙,張 玲,龐 浩,鐘一冉11(117)
空管自動化系統等保測評實踐與安全防護技術研究 ················································郭金亮11(126)
軍工單位涉密網中信息導出的安全風險分析 ······················································陳 剛11(136)
美國網絡外交的政策演變、組織體系及發展趨勢 ···········································李 艷,孫寶云12(59)
網絡安全和信息化與戰略管理之問題思考 ·········································魯 冰,黃付慶,王 軍12(70)
基于商用密碼技術的鐵路行業統計調查系統安全研究 ···············································陸 鋮12(77)
信道加密設備與網絡加密設備差異性研究和運維保障管理 ···················劉俊杰,周 勇,邱海彬,閆雪強12(85)