期刊文献+

一种面向融合泛在网的协同防护体系设计

Collaborative Protection Architecture Design Orient to Fusion Ubiquitous Network
下载PDF
导出
摘要 在深入分析融合泛在网功能和特征的基础上,通过增加安全接入网关和虚拟重构安全控制服务器(简称安全控制服务器)两类主要的功能实体构成协同防护的硬件体系,同时通过策略订阅实现协同防护的软件逻辑体系,并采用基于证据投影分解方法的证据理论实现安全态势评估,从而实现在融合泛在网中各种末梢网络均可通过安全接入网关,利用现有的各种异构接入网络安全接入到位于IP核心网的安全服务平台,也可将安全服务命令和数据发送到末梢节点。 With the in-depth analysis on the functions and features of fusion ubiquitous network, the hardware system for collaborative protection described in this paper was implemented by adding two kinds of function entities namely fu- sion security access gateway and virtual reconstruction security control server (security control server). Meanwhile, the software logical system was implemented by policy subscription. Additionally, an evidence projection decomposition method was used on evidence combination,which provides a security situation analysis method. Thus, in fusion ubiqui- tous network,various peripheral networks could use existing heterogeneous access network to access the security ser- vice platform in the IP core network by security access gateway. Meanwhile, the command and data of security service can he sent to peripheral nodes in the other direction.
出处 《计算机科学》 CSCD 北大核心 2017年第5期100-104,131,共6页 Computer Science
基金 国家自然科学基金项目(61272419)资助
关键词 融合泛在网 安全接入网关 安全控制服务器 态势评估 Fusion ubiquitous network,Security access gateway, Security control server, Situation analysis
  • 相关文献

参考文献6

二级参考文献53

  • 1杨凯.银联数据异地灾难备份架构设计探讨[J].中国金融电脑,2005(9):51-54. 被引量:2
  • 2严商.基于WCF的分布式程序的研究与实现[D].武汉:武汉理工大学,2009:13-24.
  • 3Christian Nagel,Bill Evjen.C≠高级编程[M].6版.北京:清华大学出版社,2008:1308-1366.
  • 4John W Rittinghouse,James F Ransome.云计算实现、管理与安全[M].北京:机械工业出版社,2010:105-122.
  • 5Gong Chunye,Liu Jie,Zhang Qiang,et al.The characteristics of cloud computing[C].39th International Conference on Parallel Processing Workshops,2010:275-279.
  • 6Xue Jing,Zhang Jian-jun.A brief survey on the security model of cloud computing[C].Ninth International Symposium on Distribu- ted Computing and Applications to Business, Engineering and Science.IEEE Computer Society,2009:475-478.
  • 7Bass T. Intrusion detection systems and multisensor data fu - siomcreating cyberspace situational awareness[J]. Communica- tions of the ACM, 2000,43 (4) : 99-105.
  • 8Endsley M R. Toward a theory of situation awareness in dyna- mic systems[J]. Human Factors The Journal of the Human Fac- tors and Ergonomics Society, 1995,37 ( 1 ) : 32-64.
  • 9Wooldridge M, Jennings N R. Intelligent Agents:Theory and Practice[J]. Knowledge Engineering Review, 1995,10(2) : 1-67.
  • 10Jennings N R, Sycara K, Wooldridge M. A roadmap of agent re- search and development[J]. Autonomous Agents and Multi-A- gent Systems, 1998,1 (1) : 7-38.

共引文献198

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部