期刊文献+

基于策略的客户端集中式安全管理系统研究 被引量:1

Research on policy-based client host central security management system
下载PDF
导出
摘要 客户端是企业网安全管理的薄弱环节,目前还没有简单有效的管理工具。基于先进的策略管理思想,构建一个包括用户终端在内的整体式安全管理系统。通过在局域网内统一部署客户端安全策略,较好地解决客户端安全管理的难题。文中简述客户端存在的安全问题、策略管理框架和研究现状,给出系统总体结构设计,重点探讨客户端安全策略和策略代理模块设计的关键技术,具有较大的实际应用价值。 The client side is the weak link of enterprise network safety control, and there isn't any simple effective management tool at present. This research based on the advanced policy management constructs a integral security management system including the user terminals. The difficult problem of client side safe ty control has been solved well by unifying the deployment of client side security policy in the local area network. The existent security problems of client side, the policy management frame, and the present sit uation of the research is summarized in this paper. We have given the design of system gross structure, and have discussed the key technologies of client side security policy and the design of policy proxy module with emphasis. It would have very lager actual application value.
出处 《黑龙江工程学院学报》 CAS 2011年第3期56-60,共5页 Journal of Heilongjiang Institute of Technology
基金 黑龙江省教育厅资助项目(11551402)
关键词 网络安全 策略管理 安全策略 策略代理 Network security policy management security policy policy proxy
  • 相关文献

参考文献8

  • 1客户端管理-内网安全的根本防护[N].中国计算机报.2005,1406(29).
  • 2A. WESTERINEN, J. SCHNIZLEIN, J. STRASSNER. Terminology for Policy based Management [S]. IETF RFC3198,2001,11.
  • 3The IETF Policy Framework Working Group.. Charter a vailable at [Z].http://www, ietf. org/html. Charters/policy--charter, html, 1999- 06.
  • 4王新华,韦卫,朱震.基于策略的网络安全设备管理系统[J].计算机工程与应用,2005,41(27):112-115. 被引量:6
  • 5郝宁,罗军舟,杨明.安全联动响应中安全策略中心的设计与应用[J].武汉大学学报(理学版),2004,50(A01):135-138. 被引量:3
  • 6向军,齐德昱,徐克付,钱正平.基于综合联动机制的网络安全模型研究[J].计算机工程与应用,2008,44(13):117-119. 被引量:7
  • 7R. YAVATKAR, D. PENDARAKIS, R. GUERIN, RFC2753 A Framework for Policy-based Admission Control[Z]. January 2000.
  • 8Policy and Management Technologies and Protocols[S]. http://www. cisco, com/networkers/nw99_pres/index. htm#policy and management technolgies and protocols, 2009-12.

二级参考文献10

  • 1Crosbie M,Spafford G.Active defense of a computer system using autonomous[R].Dept of Computer Sciences,Purdue University,1995.
  • 2Gregory M,White B,Fisch E A,et al.Cooperation security managers:A peer based intrusion detection system[J].IEEE Network, 1996,14.
  • 3R Yavatkar,D Pendarakis,R Guerin. A Framework for Policy-based Admission Control[S].IETF RFC 2753,2000
  • 4D Durham,J Boyle,R Cohen et al.The COPS(Common Open Policy Service)Protocol[S].IETF RFC 2748,2000
  • 5A Smith,D Partain,J Seligson. Definitions of Managed Objects for Common Open Policy Service(COPS) Protocol Clients[S].IETF RFC 2940,2000
  • 6Nigel Sheridan-Smith.A Distributed Policy-Based Network Management (PBNM)system for Enriched Experience Networks TM.University of Technology ,Sydney Faculty of Engineering Information and Communication Group, 2003
  • 7郎国军.面向安全设备的网络管理方法[EB/OL].http:∥www.antpower.ort/Folder_AntTopic/AntFolder_Security_Management_Engineering/AntFoldr_Net -work_Management,.
  • 8蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 9沈俊,顾冠群,罗军舟.网络管理的研究和发展[J].计算机研究与发展,2002,39(10):1153-1167. 被引量:31
  • 10李玉娟,李传林.一种新的基于Agent的入侵检测系统模型[J].计算机应用研究,2004,21(4):104-105. 被引量:6

共引文献11

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部