期刊文献+

基于零信任的远程办公安全平台在证券行业的应用 被引量:1

下载PDF
导出
摘要 针对安全远程办公业务场景,传统的VPN解决方案存在诸多局限性。文章介绍了一种基于零信任和软件定义边界理念设计的安全平台,并结合证券行业自身特点进行实践。实际应用表明,该平台在具备较高安全级别的基础上,同时具备快速的业务拓展能力。
作者 何宇 林岳
出处 《信息网络安全》 CSCD 北大核心 2020年第S01期138-140,共3页 Netinfo Security
  • 相关文献

参考文献5

二级参考文献53

  • 1范小康,何连跃,王晓川,刘晓东,林彬,申彤,宋晓虹.一种基于RBAC模型的角色管理方法[J].计算机研究与发展,2012,49(S1):211-215. 被引量:19
  • 2ABHILASHA BHARGAV-SPANTZEL,ANNAC.SQUICCIARINI,AND ELISA BERTINO. Trust Negotiation in Identity Management[J]. Security & Privacy, 2007,5(2) :55 - 63.
  • 3Rajarajan Sampath, Deepak Goel. RATING: Rigorous Assessment of Trust in Identity Management[C]//Proceedings of the First International Conference on Availability, Reliability and Security. IEEE COMPUTER SOCIETY, 2006 : 10 -19.
  • 4Altmann, J. Sampath, R. UNIQUE: A User-Centric Framework for Network Identity Management [C]//Network Operations and Management Symposium. 10th IEEE/IFIP, 10.1109/NOMS. 2006:495 -506.
  • 5Daeseon Choi,Seung-Hun Jin and Hyunsoo Yoon. Trust Management for User-Centric Identity Management on the Internet[C]// ISCE 2007, IEEE International Symposium. Consumer Electronics, 2007:1-4.
  • 6M. Burmester, Y. Desmedt, Hiroshi Doi, et al. A Structured E1Gamal-Type Multisignature Scheme[J]. PKC2000, 2000,LNCS1751: 466-483.
  • 7Mitsuru Tada. An Order-Specified Multisignature Scheme Secure Against Active Insider Attacks[C]//L. Batten, J. Seberry. ACISP2002. Melbourne: Springer Berlin/Heidelberg 2002: 57-106.
  • 8Gangishetti R, choudary Gorantla M, Lal Das M, et al. Identity Based Multisignatures[J]. lOS press, 2006, 17(2) : 177-186.
  • 9Bart De Decker, Frank Piessens, Jan Smith, et al. Advances in Network and Distributed Systems Security[M]. Boston :Springer, 2002.
  • 10C. C. Chang, E.-H. Lu, S.-F. Pon, andJ.-Y. Lee, Applying Harn- Kiesler multisignature scheme to electronic document systems [C]//Proc. National Information Security Conf.., R.O.C., 1995: 35-38.

共引文献25

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部