期刊文献+

协同设计系统安全体系结构研究 被引量:1

Research on security structure of collaborative design system
下载PDF
导出
摘要 协同设计系统是计算机支持协同工作理论和技术在企业产品开发与设计中的重要应用,为确保系统信息安全这一协同设计系统应用推广的基本前提,以信息系统安全体系结构的基本理论和协同设计系统的系统特性为基础,确定了协同设计系统的安全体系结构至少需要满足系统功能特性、系统分布特性和系统技术特性三个方面的安全需求,并应用面向信息系统的安全视图方法提出了一个由安全功能视图、安全系统视图、安全技术视图以及三种视图之间的关系和之上的约束有机构成的面向分布式应用的协同设计系统的安全体系结构,从总体上指导了协同设计系统的安全设计和实现. Collaborative design system is an important application of theory and technology of computer-supported collaborative work in the product design of enterprises. Information security of system is the basis of applying and spreading collaborative design system. Based on the fundamental theory of security structure of information system and the characters of collaborative design system, it is determined that the security structure for collaborative design system at least needs to meet the security requirements in the function, distribution and technology characters of the system. Using the security view method for information system, the security structure, which consists of security function view, security system view, security technology view together with the relations and restrictions between them, has been proposed. This security structure faces on the distributed application of collaborative design system, and can be used as an important reference in security design and implementation of collaborative design system.
出处 《沈阳工业大学学报》 EI CAS 2007年第2期173-176,共4页 Journal of Shenyang University of Technology
基金 国家"十五"重大攻关课题资助项目(2001BA201A14) 沈阳市科技基金资助项目(1053125-1-01)
关键词 信息系统 信息安全 安全视图方法 安全体系结构 协同设计系统 计算机支持协同工作 information system information security security view method security structure collaborative design system computer-supported collaborative work
  • 相关文献

参考文献8

  • 1Jonathan G.Computer-supported cooperative work:history and focus[J].IEEE Computer,1994(5):19-26.
  • 2Lee B G,Narayanan N H,Chang K H.An integrated approach to distributed version management and rolebased access control in computer supported collaborative writing[J].The Journal of Systems and Software,2001,59:119-134.
  • 3Lin A,Brown R.The application of security policy to role-based access control and the common data security architecture[J].Computer Communications,2000,23(17):1584-1593.
  • 4Wu S L,Sheth A,Miller J,et al.Authorization and access control of application data in workflow system[J].Journal of Intelligent Information System,2002,18(1):71-94.
  • 5Chang N,Zhang C G.Designing a complete model of role-based access control system for distributed networks[J].Journal of Information Science and Engineering,2002,18:871-889.
  • 6Bertino E,Bonattie P,Ferrari E.TRBAC:A temporal role-based access control model[J].Transactions on Information and System Security,2001,4 (3):191 -223.
  • 7Joon S P,Myong H K,Judith N F.A secure workflow system for dynamic collaboration[A].Proceedings of 16th International Conference on Information Security[C].Trusted Information:The New Decade Challenge Paris,2001:167-181.
  • 8范玉顺.网络化制造的内涵与关键技术问题[J].计算机集成制造系统-CIMS,2003,9(7):576-582. 被引量:143

二级参考文献11

  • 1刘飞 刘军 雷琦.网络化制造的内涵及研究发展趋势[A]..2002年中国机械工程学会年会论文集光盘(论文编号:40201)[c].北京:机械工业出版社,2000..
  • 2MONTREUIL B FRAYRET J M D′Amours S.A strategic framework for networked manufacturing[J].Computers in Industry,2000,(42):299-317.
  • 3LIU F, YIN C, LIU S. Regional networked manufacturing system[J]. Chinese Journal of Mechanical Engineering, 2000,13(Supplement) : 97- 103.
  • 4Rockwell automation e-manufacturing industry road mapmaking sense of e - manufacturing [EB/OL]. http://www.rockwellautomation, com. 2000- 11.
  • 5LEE J, ALI A, KOC M. E-manufacturing-its elements and Impact[A]. Proceedings of the Annual Institute of Industrial Engineering (IIE) Conference[C]. Dallas, Texas, USA,2001.21-23.
  • 6LEE J. E- manufacturing systems: fundamental and tools[J]. Int. Journal of Robotics and Computer-Integrated Manufacturing, Accepted for Publication, 2003.
  • 7MONTREUIL B, FRAYRET J M. D'Amours S. A strategic framework for networked manufacturing[J]. Computers in Industry,2000, (42) :?.99-317.
  • 8张曙.分散网络化制造[J].机械与电子,1998(5):3-6. 被引量:39
  • 9严隽琪.数字化与网络化制造[J].工业工程与管理,2000,5(1):8-11. 被引量:43
  • 10杨叔子,吴波,胡春华,程涛.网络化制造与企业集成[J].中国机械工程,2000,11(1):45-48. 被引量:257

共引文献142

同被引文献7

  • 1赵志刚,王占军.包过滤型防火墙在文件形式考试系统中的应用[J].沈阳师范大学学报(自然科学版),2007,25(3):343-344. 被引量:1
  • 2周立功.ARM微控制器基础和实战[M].北京:北京航空航天大学出版社,2003.
  • 3微处理器概述(一)[EB/OL].http://huangsir.bokee.com/1257492.html.
  • 4英培特.uClinux实验指导手册[M].深圳市英蓓特信息技术有限公司,2005:35-46.
  • 5KAMAL R. Embeddedsystems : architecture, programminganddesign[ J]. McGraw - HillEducation (Asia) Co, 2005 : 22 - 24.
  • 6CINEMA. ColumbiaInterNetextensibleMuhimedia [ EB/ OL]. (2009 -02 -01 )http://www. cs. columbia, edu / IRT/cinema.
  • 7邵泽云.浅谈防火墙在计算机网络中的应用[J].农业网络信息,2007(8):88-90. 被引量:2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部