期刊文献+

复杂信息系统模型研究与电子政务案例分析

Study of Complicated Information System Model and E-government Case
下载PDF
导出
摘要 提出了用安全的复杂信息系统体系结构模型(SCISAM)构建安全、互操作、可扩展的CIS。采用分层方式降低系统复杂度,利用Web Service实现互操作和可扩展,使用密码支撑层、安全防护与可靠性支持层保证系统安全,通过系统管理层实现可管理性。某电子政务案例及其性能统计和仿真证明该模型适用于高安全级别的系统。 A secure complicated information system architecture model is introduced to construct a secure, interoperable and extensible CIS. The model divides CIS into several layers to reduce system complexity. It uses Web service technique to realize the interoperability and extensibility. It introduces encryption support layer, security protection and reliability support layer to guarantee the system security and make the CIS administrable with system management layer, A study of E-government case with performance analysis and simulation proves that the model suits security-critical complex information system.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第8期133-135,共3页 Computer Engineering
基金 国家"十五"科技攻关计划基金资助重点项目(2002AA1Z67101)
关键词 信息系统模型 电子政务 安全性 互操作性 可扩展性 Information system model E-government Security Interoperability Extensibility
  • 相关文献

参考文献9

  • 1Shnitko A. Adaptive Security in Complex Information Systems[C]//Proceedings of the 7^th Korea-Russia International Symposium on Science and Technology, Ulsan,South Korea. 2003: 206-210.
  • 2李守鹏,孙红波.信息系统安全模型研究[J].电子学报,2003,31(10):1491-1495. 被引量:13
  • 3Zhou BY. Security Analysis and the DSM Model[C]//Proceedings of the 13^th International Workshop on Database and Expert Systerns Applications, Aixen Provence, France. 2002:17-21.
  • 4Hripcsak G. IAIMS Architecture[J]. Journal of the American Medical Informatics Association, 1997, 4(2):S20-S30.
  • 5Lee S Y, Koh J S. WWW-based Reliability Information System[J].Computers & Industrial Engineering, 1998, 35(3/4): 599-602.
  • 6Chou S C T. Migrating to the Web: A Web Financial Information System Server[J]. Decision Support Systems, 1998, 23(1): 29-40.
  • 7Van R. de Velde. Framework for a Clinical Information System[J].International Journal of Medical Informatics, 2000, 57(1): 57-72.
  • 8Wang K, Su R D, Li Z X, et al. Robust Disaster Recovery System Model[J]. Wuban University Journal of Natural Sciences, 2006, 11(1):170-174.
  • 9刘权.我国电子政务发展现状与趋势[J].中国信息导报,2004(12):21-23. 被引量:3

二级参考文献12

  • 1David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role based access control model and reference implementation within a corporate intranet[ J] .ACM Ttansactions on lnformtion Systems Security, February 1999,2(1) :34- 64.
  • 2John McLean. Security Models and Information Flow[ A ]. Proceedings of the IEEE Symposium on Security and Privacy[C]. Oakland, California, IEEE Computer Society Press, 1990.180 - 187.
  • 3John McLean. Security Models, Encyclopedia of Software Engineering[M]. Marciniak J (ed.).Wiley & Sons, 1994.
  • 4John McLean. A comment on the "basic security theorem" of bell and LaPadula[ J]. Information Processing Lettes, 1985,20(2) :67 - 70.
  • 5D E Bell, L J La Padula. Secure Computer System: Unified Exposition and Multics Interpretation [ R ]. The MITRE Corporation, Massachusetts, USA, ESD-TR-75 - 306,1976.
  • 6Andrew C. Myers Barbara Liskov. A Decentralized Model for Information Flow Control[A] Proceedings of the 16th ACM Symposium on Operating Systems Principles[ C ]. Saint-Malo, France: October 1997. 129- 142.
  • 7Ravi S. Sandhu. Lattice-based access control models[J]. IEEE Computer, November 1993,26( 11 ) : 9 - 19.
  • 8Carl E. Landwehr, Constance L. Heitmeyer and John D. McLean. A security model for military message systems[J]. ACM Trans, Comput,Syst, 1984,2(3) : 198 - 222.
  • 9Sandhu, R S E J Coyne, H L Feinstein and C E Youmsn. Role-based access control models[ J]. IEEE Computer, 1996,29(2) :38 - 47.
  • 10Jonathan Moffett, Morris Sloamn and Kevin Twidle. Specifying discretionary access control policy for distributed systems[J]. Computer Communications, 1990,13(9) :571 - 580.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部