期刊文献+

复杂信息系统支撑平台研究 被引量:3

Study on Complicated Information System Support Platform
下载PDF
导出
摘要 保障复杂信息系统(CIS)的安全、互操作、可扩展和可管理非常关键。该文提出安全的CIS体系结构模型以指导CIS的建设或改造。模型把CIS划分为不同层次以降低系统复杂度,采用WebService技术实现互操作和可扩展,使用密码支撑层、安全防护与可靠性支持层在不同层面保证安全性与可靠性。通过系统管理层与各层交互,实现系统的可管理性。某电子政务试点示范工程案例及其网络统计、网络仿真证明模型不会影响业务系统性能。模型适用于政府、军队、银行等高安全级别的信息系统。适当简化模型中相应层次,模型也可用于相对简单的信息系统。 It is crucial to make Complicated Information System (CIS) secure, interoperable, extensible and controllable. This paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. It divides CIS into layers to reduce system complexity. Web service is adopted to fulfill interoperability and extensibility. It uses encryption support layer, security protection and reliability support layer to guarantee system security and stability. It uses system management layer to interact with other layers to make CIS administrable. A case study with performance statistic and network simulation show the model can satisfy the need of e-government without interfere with system performance. This model is apt to security-critical environment such as government, military and bank. Been properly simplified, it can be applied to relative simple information system too.
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第5期1215-1219,共5页 Journal of Electronics & Information Technology
基金 国家"十五"重点科技攻关计划(2002AA1Z67101)资助课题
关键词 信息系统 安全 体系结构模型 电子政务 Information system Security Architecture model E-government
  • 相关文献

参考文献16

  • 1Shnitko A.Adaptive security in complex information systems[C].Proceedings of the 7th Korea-Russia International Symposium on Science and Technology,Ulsan,South Korea,2003:206-210.
  • 2李守鹏,孙红波.信息系统安全模型研究[J].电子学报,2003,31(10):1491-1495. 被引量:13
  • 3Zhou B Y.Security analysis and the DSM model[C].Proceedings of 13th International Workshop on Database and Expert Systems Applications,Aix-en-Provence,France,2002:17-21.
  • 4Hripcsak G.IAIMS Architecture[J].Journal of the American Medical Informatics Association,1997,4(2):S20-S30.
  • 5Lee S Y and Koh J S.WWW-based reliability information system[J].Computers & Industrial Engineering,1998,35(34):599-602.
  • 6Chou S C T.Migrating to the web:A web financial information system server[J].Decision Support Systems,1998,23(1):29-40.
  • 7Van R and de Velde.Framework for a clinical information system[J].International Journal of Medical Informatics,2000,57(1):57-72.
  • 8XML在电子政务中的应用指南[S].2005,GB/Z 19669-2005.
  • 9信息技术设备的安全[S].2001,GB 4943-2001.
  • 10路由器安全技术要求[S].1999,GB/T 18018-1999.

二级参考文献12

  • 1David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role based access control model and reference implementation within a corporate intranet[ J] .ACM Ttansactions on lnformtion Systems Security, February 1999,2(1) :34- 64.
  • 2John McLean. Security Models and Information Flow[ A ]. Proceedings of the IEEE Symposium on Security and Privacy[C]. Oakland, California, IEEE Computer Society Press, 1990.180 - 187.
  • 3John McLean. Security Models, Encyclopedia of Software Engineering[M]. Marciniak J (ed.).Wiley & Sons, 1994.
  • 4John McLean. A comment on the "basic security theorem" of bell and LaPadula[ J]. Information Processing Lettes, 1985,20(2) :67 - 70.
  • 5D E Bell, L J La Padula. Secure Computer System: Unified Exposition and Multics Interpretation [ R ]. The MITRE Corporation, Massachusetts, USA, ESD-TR-75 - 306,1976.
  • 6Andrew C. Myers Barbara Liskov. A Decentralized Model for Information Flow Control[A] Proceedings of the 16th ACM Symposium on Operating Systems Principles[ C ]. Saint-Malo, France: October 1997. 129- 142.
  • 7Ravi S. Sandhu. Lattice-based access control models[J]. IEEE Computer, November 1993,26( 11 ) : 9 - 19.
  • 8Carl E. Landwehr, Constance L. Heitmeyer and John D. McLean. A security model for military message systems[J]. ACM Trans, Comput,Syst, 1984,2(3) : 198 - 222.
  • 9Sandhu, R S E J Coyne, H L Feinstein and C E Youmsn. Role-based access control models[ J]. IEEE Computer, 1996,29(2) :38 - 47.
  • 10Jonathan Moffett, Morris Sloamn and Kevin Twidle. Specifying discretionary access control policy for distributed systems[J]. Computer Communications, 1990,13(9) :571 - 580.

共引文献17

同被引文献18

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部