期刊文献+

移动支付系统安全合规性检测与分析方法研究 被引量:2

RESEARCH ON METHOD OF SECURITY COMPLIANCE DETECTION AND ANALYSIS FOR MOBILE PAYMENT SYSTEM
下载PDF
导出
摘要 介绍移动支付业务的发展现状和移动支付系统安全合规性检测的重要性,研究相关安全标准对信息系统安全合规性检测的要求,重点从基于系统日志信息、基于网络通信信息和基于系统配置三个方面描述合规性检测分析方法。在此基础上设计移动支付系统安全合规性分析与自动化检测模型,提高检查结果的准确性和合规性,有利于移动支付系统的持续安全运维。 In this paper the status quo of the development of mobile payment business and the importance of security compliance detection of mobile payment system are introduced. Corresponding security standards on the requirements to infbrmation system security compliance detection are studied. The emphasis of the paper is to describe the compliance detection and analysis methods from three aspects : the system logs-based, the network communication information-based and the system configuration-based. According to these, a security compliance analysis and automatic detection model for mobile payment system is designed, which improves the accuracy and compliance of the detection outcomes, and this helps the sustained secure operation of the mobile payment system.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第10期294-299,共6页 Computer Applications and Software
关键词 移动支付 安全标准 合规性检测 系统日志信息 网络通信信息 系统配置 Mobile payment Security standards Compliance detection System log information Network communication informationSystem configuration
  • 相关文献

参考文献10

  • 1袁琦.移动支付业务和技术发展现状[J].电信网技术,2011(4):1-6. 被引量:6
  • 2宋颖.我国移动支付业务发展情况[C] //2010信息通信网技术业务发展研讨会,北京,2010:145-145.
  • 3全国信息安全标准化技术委员会.信息安全技术信息系统安全等级保护基本要求[S].2010.
  • 4全国信息安全标准化技术委员会.信息安全技术信息系统安全等级保护实施指南[S].2010.
  • 5PCI Security Standards Council.Payment Card Industry Data SecurityStandard(Version 2.0)[S].2010-10.
  • 6张耀疆.萨班斯法案与信息安全初探[EB/OL].2005.http://wen-ku.baidu.com/view/468a9d4e852458fb770b565b.html.
  • 7国际标准化组织ISO.BS7799[S].2002.
  • 8罗军舟,金嘉晖,宋爱波,东方.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21. 被引量:826
  • 9何翔,薛建国,汪静.基于动态网络安全模型的应用[C] //北京烟草学会第四次代表大会暨学术交流会,北京,2008:62-62.
  • 10Tan Pangning,Steinbach M,Kumar V.数据挖掘导论[M].范明,范宏建,译.北京:人民邮电出版社,2006:241-327

二级参考文献65

  • 1LI J,WANG Q,WANG C,et al.Fuzzy keyword search over en-crypted data in cloud computing. INFOCOM’’10 . 2010
  • 2MORETTI C,BUI H,HOLLINGSWORTH K,et al.All-pairs:an abstraction for data-intensive computing on campus grids. IEEE Transactions on Parallel and Distributed Systems . 2010
  • 3DONG F,,LUO J,SONG A,et al.Resource load based stochasticDAGs scheduling mechanism for grid environment. HPCC’’10 . 2010
  • 4ZHOU J,LUO J,SONG A.NETOP:a non-cooperative game basedtopology optimization model towards improving search performance. Journal of Internet Technology .
  • 5Google investor relations. http://investor.google.com/financial . 2011
  • 6GREENBERG A,HAMILTON J,MALTZ D A,et al.The cost of acloud:research problems in data center networks. SIGCOMMComput Commun Rev . 2008
  • 7GUO C,LU G,LI D,et al.BCube:a high performance,server-centricnetwork architecture for modular data centers. SIGCOMM’’09 . 2009
  • 8About virtual machine templates. http://technet.micro-soft.com/en-us/library/bb740838.aspx . 2011
  • 9ANDR H,LAGAR-CAVILLA S,WHITNEY J A,et al.SnowFlock:virtual machine cloning as a first-class cloud primitive. ACM TransComput Syst . 2011
  • 10PIKE R,DORWARD S,GRIESEMER R,et al.Interpreting the Data:Parallel Analysis with Sawzall. Scientific Programming Journal . 2005

共引文献855

同被引文献12

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部