期刊文献+

面向网络隔离架构的业务流行为控制高可信交互框架 被引量:5

Highly Trusted Interaction Framework for Business Behavior Control Based on Network Isolation Architecture
下载PDF
导出
摘要 本文提出一种面向网络隔离架构的业务流行为控制的高可信交互框架,解决了企业互联网移动应用难以访问复杂安全架构下的高安全区业务数据的问题,确保了业务系统关键数据的安全.在网络安全防护要求下,引入移动接入网关,分解业务数据跨安全区交互过程,通过特殊的访问转换与通信方法,实现了业务数据通过各型隔离装置的安全、可信传输和业务流行为控制.该框架目前已在员工报销、考勤打卡、电力系统配网抢修、移动巡检等多个业务领域得到广泛应用. This study proposes a highly trusted interaction framework for business behavior control based on network isolation architecture. This framework not only makes the access of business data in the high security zone under the complex security architecture for enterprise internet mobile applications possible but also ensures the security of key data of the business system. Under the requirements of network security protection, the mobile access gateway is introduced to decompose the interaction process of business data across the security zone. Then, it designs an access conversion and communication method, which realizes the safe and reliable transmission of business data through various isolation devices and business flow control. The framework has been widely used in many business areas such as employee reimbursement, attendance punching, power system distribution repair and mobile inspection.
作者 黄姗姗 蒋厚明 胡牧 刘士进 魏珍珍 HUANG Shan-Shan;JIANG Hou-Ming;HU Mu;LIU Shi-Jin;WEI Zhen-Zhen(Nanjing NARI Information&Communication Technology Co.Ltd.,Nanjing 210008,China)
出处 《计算机系统应用》 2019年第10期98-102,共5页 Computer Systems & Applications
基金 公司自筹项目:移动应用公共服务组件关键技术研究(5246DR190020)~~
关键词 网络隔离架构 高可信交互框架 互联网移动应用 高安全区业务数据 移动接入网关 业务流行为控制 network isolation architecture highly trusted interaction framework Internet mobile applications high security zone business data mobile access gateway business flow control
  • 相关文献

参考文献9

二级参考文献58

  • 1刘建国.物理隔离的目标及实现[J].计算机安全,2004(7):23-25. 被引量:3
  • 2辛耀中,陶洪铸,李毅松,石俊杰.电力系统数据模型描述语言E[J].电力系统自动化,2006,30(10):48-51. 被引量:73
  • 3Patrick D M. Policy Management in Secure Group Communication[A]. The eighth ACM symposium on Access control models and technologies, 2003.
  • 4TCG mobile trusted module speeifieation: Version 1.0, Revision 7.02 [ S ]. Beaverton, OR, USA: Trusted Computing Group, 2010.
  • 5ALVES T, FELTON D. TrustZone.- integrated hardware and software security [J].Information Quarterly, 2004, 3 (4) : 18-24.
  • 6AZEMA J, FAYAD G. M-shield mobile security technology: making wireless secure [R]. Dallas, TX, USA: Texas Instrument, 2008.
  • 7DIETRICH K, WINTER J. Towards customizable, application specific mobile trusted modules[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 31-40.
  • 8DWIVEDI H, CLARK C, THIEL D. Mobile application security[M]. New York, NY, USA: McGraw Hill, 2010.
  • 9BUGIEI. S, EKBERG J E. Implementing an application-specific credential platform using late-launched mobile trusted module[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 21-30.
  • 10NAUMAN M, KHAN S, ZHANG X, et al. Beyond kernel- level integrity measurement: enabling remote attestation for the android platform [ C]// Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, June 21-23, 2010, Berlin, Germany: 17p.

共引文献84

同被引文献41

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部