PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Network Business Security Model Based on Developed BLP Model in Electric Power Enterprise

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Model bezpieczeństwa sieci informatycznej wykorzystywanej do kontroli systemów zasilania
Języki publikacji
EN
Abstrakty
EN
The security defense of Electric Power Information Network should focus on the security of network business running on Intranet. In order to meet the special requirements of network business security in Electric Power Information Network, the access rules of network business between different security levels are researched, and a network business security model based on developed BLP model is proposed. By re-definiting the trusted subjects of BLP model, the network business security model can meet the access rules of network business between diffident security level.
PL
Analizowano bezpieczeństwo i niezawodność informatycznej sieci wykorzystywanej do kontroli systemów zasilania. Analizowano systemy dostępu do sieci na różnych poziomach bezpieczeństwa.
Rocznik
Strony
63--66
Opis fizyczny
Bibliogr. 11 poz., schem.
Twórcy
autor
autor
autor
autor
Bibliografia
  • [1] José E.O. Pessanh, O.R. Saavedr, Julio C.R. Buza, Alex A. Paza, Carlos P. Pomaa. Power system stability reinforcement based on network expansion: A practical case, International Journal of Electrical Power & Energy Systems, 3(2007), No.29,208-216
  • [2] Nicol, David M., Davis, Charles M., Overbye, Tom . A tested for power system security evaluation, International Journal of Information and Computer Security, 2(2009), No.3,114-131
  • [3] DongHui Jiang. Security Offense and Defense Testing and Analysis of LAN, Science&Technology Information, 2009, 125-128
  • [4] Sahar Selim, Mohamed Hashem, Taymoor M. Nazmy . Intrusion Detection using Multi-Stage Neural Network, International Journal of Computer Science and Information Security, 4(2010), No.8, 14-20
  • [5] YuanFei Huang, LiYong Ji, LiPing Jin. Investigation of Network Information Security Situation and Hot Issues, Telecommunications Science, 2009, 213-216
  • [6] XingHua Chen. Enterprise Network Information Security and Countermeasure Study, Agriculture Network Information ,2009, 431-437
  • [7] Chao Li. Simple Exploration of Network Information Security, Scientific&Technological Information Development and Economic, 2009, 97-101
  • [8] HongSheng Yan, XueLi Wang, Jun Yang. Computer Network Security and Defense, Electronics Industry Press, 2007, 45-49
  • [9] R.Sandhu, V.Bhamidipati, E.Coyne. The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline, Proc. IEEE Symp. Proceedings of Second ACM Workshop on Role-Based Access Control, 1997, 41-49.
  • [10]WANG Fei, LV Hui-jun, SHEN Chang-xiang. Terminal Categorial Data Protection Based on Trusted Computing, Computer Engineering, 2008, 133-135
  • [11]D.E.Bell, L.LaPaDula. Secure Computer Systems: Mathematical Foundations and Model,Technical Report M74~244, Mitre Corp., Bedford, MA, May 1973.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPOH-0062-0016
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.