期刊文献+

电力行业移动应用安全体系关键技术研究 被引量:4

Research on Security Architecture Key Technology of Mobile Applications in the Electric-Power Industry
下载PDF
导出
摘要 电力行业在推广移动应用为企业带来便利的同时,如何应对随之而来的安全挑战成为亟需解决的问题。文章从分析电力行业移动应用面临的安全风险入手,通过对传统PPDR模型进行优化提出了电力行业移动应用安全模型,并在此模型基础上构建了电力行业移动应用安全体系;之后从移动端、服务端、网络层等方面对该体系涉及的关键技术进行了研究。实践表明,通过建设移动应用安全体系,可以形成一套涵盖安全技术、安全策略和管理制度在内的完整移动应用安全解决方案,有效满足电力行业移动应用需求。 With the development of mobile applications in the power industry, new security challenges are emerging. This paper firstly analyzed the security risk of mobile applications which power industry facing, then proposed power industry mobile application security model by updating the traditional PPDR model. On this basis, this paper built a new mobile application security architecture of the power industry. Finally this paper studied the key technologies from several aspects of mobile terminal, server, network layer. The practice has showed that by building a mobile application security architecture, a complete set of mobile application security solutions including security technologies, security policies and management systems can be formed, which can meet the demand of mobile applications effectively.
作者 赵永国 张诗军 ZHAO Yong-guo ZHANG Shi-jun(China Southern Power Grid Co., Etd., Guangzhou 510623, China)
出处 《电力信息与通信技术》 2017年第3期20-26,共7页 Electric Power Information and Communication Technology
基金 中国南方电网有限责任公司科技项目"基于分布式架构的面向移动应用的中间件研究与开发"(000000KK52150012) 中国南方电网有限责任公司信息化项目"移动应用平台V1.0建设"(000000HK41150007)
关键词 智能电网 移动应用安全体系 安全接入:移动设备管理 推送技术 smart grid: mobile application security architecture secure access mobile device management (MDM) message push technology
  • 相关文献

参考文献15

二级参考文献93

  • 1刘晔.企业网络信息安全研究[J].中国科技信息,2006(20):138-139. 被引量:4
  • 2ISO/IEC FDIS 17799. Information technology-Security techniques-Code of practice for information security management. 2005.
  • 3ISO/IEC 13335. Information technology-Security techniques. Guidelines for the management of IT security (GMITS). 2001.
  • 4Winn Schwartau. Time Based Security, 1999-2001.
  • 5王庆波,金漳,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2010.
  • 6Rich uhlig, Gil Neiger, Dion Rodgers. Intel virtualization technology [J]. IEEE Computer. 2005, 38(5):48-56.
  • 7Smith J, Nair R. The architecture of virtual machines [J]. Computer. 2005, 38(5):32-38.
  • 8Ronald Perez, Reiner Sailer, Leendert Van Doom. Virtualization and hardware-based security [J]. IEEE Security & Privacy. 2008, 6(5):24-31.
  • 9Rosenblum M, Garfinkel T. Viztual machine monitors: current technology and future trends [J]. IEEE Computer Magazine, 2005, 38(5):39-47.
  • 10MURRAY D, MLOS G. HAND S. Improving XEN security through disaggregation [C]. Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York, NY: ACM press, 2008: 151-160.

共引文献295

同被引文献42

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部