期刊文献+

电子审批系统安全防护技术框架研究

Study on Technical Framework of Security Protection for E-Examination System
原文传递
导出
摘要 电子审批系统是一种近年来发展迅速且作用日益重要的应用系统,这种系统在开放互联环境中为公众提供服务,因此面临诸多安全威胁。这里在分析各种安全威胁的基础上,提出一种"底层安全增强,上层安全过滤,统一安全管理"的系统安全防护技术框架,并以可信计算为基础,以访问控制为核心,提供安全审计的先进技术体系,确保框架的合理可行和高安全性。对安全防护效果的分析表明,这里提出的安全防护技术框架能够主动防御各种安全威胁,全面保护系统的安全,满足了电子审批系统的实际安全需求。 Electronic examination system,as an important application system,develops very rapidly in recent years. This system provides services for the public in an open environment,and thus faces many security threats. Based on analysis of various security threats,a technical framework with"bottom-level security enhancements top-level security filtering and unified security management"is proposed for protection of the system security. Then,with trusted computing as the foundation,access control as the core,an advanced technical system is provided for security audit,thus to ensure that the framework is reasonable,practicable and of high security. Analysis on security protection effects shows that the proposed technical framework of security protection can proactively resist a variety of security threats,offer a comprehensive protection of system security,and thus meet the actual security demand of e-examination system.
作者 李程
机构地区 国家知识产权局
出处 《信息安全与通信保密》 2011年第7期28-29,32,共3页 Information Security and Communications Privacy
关键词 应用系统安全 操作系统安全 可信计算 访问控制 application system security operating system security trusted computing access control
  • 相关文献

参考文献4

二级参考文献72

  • 1Kühnhauser W E. On Paradigms for User-Defined Security Policies in Multipolicy Environments. In:11th IFIP Intl. Information Security Conf. , Cape Town, 1995
  • 2Kühnhauser W E. A Paradigm for User-Defined Security Policies. In: 14thIEEE Symposium on Reliable Distributed Systems.Bad Neuenahr, IEEE Press, 1995
  • 3Hosmer H H. Metapolicies II. In:Proc. of the 15th National Computer Security Conf. NIST-NCSC, United States Government Printing Office, 1992. 369~378
  • 4Secure Computing Corporation. DTOS Lessons Learned Report.CDRL Sequence No. A008, Secure Computing Corporation, Roseville, Minnesota, Jun. 1997
  • 5Saydjari O S,et al. Synergy: A Distributed, Microkernel-Based Security Architecture: [Technical Report: R231]. INFOSEC Research and Technology, Nov. 1993
  • 6Olawsky D,Fine T,Schneider E,Spencer R. Developing and Using a Policy Neutral Access Control Policy. In: Proc. of the UCLA Conf. on New Security Paradigms Workshops, ACM, USA,Sep. 1996
  • 7Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, Roseville, Minnesota, Jun. 1997
  • 8Boebert W E,Kain R Y. A Practical Alternative to Hierarchical Integrity Policies. In:Proc. of the 8th National Computer Security Conf. Gaithersburg, MD, Oct. 1985.18~27
  • 9Badger L,et al. Practical Domain and Type Enforcement for UNIX. 1995 IEEE Symposium on Security and Privacy, 1995.66~77
  • 10Carney M, Loc B. A Comparison of Methods for Implementing Adaptive Security Policies. In:Proc. of the 7th USENIX Security Symposium, 1998. 1~14

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部