Information and network system security

被引:0
|
作者
Hartescu, Florin [1 ]
Nicolaescu, Stefan-Victor [1 ]
机构
[1] Natl Inst R&D Informat ICI, Res & Dev, 8-10 Maresal Alex,Averescu Ave,Sector 1, Bucharest, Romania
关键词
information security; wireless; Wi-Fi network; IT infrastructure; SSL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today all the systems that manage the security are characterized by the complexity of their major functions like identification, authentication, access control and data protection. The implementation of these functions is usually and objectively based on a trusted model that uses a trusted architecture, which is the platform of the security architectures. The purpose of a such platform is to work on the trust IT infrastructures in all the steps of their life cycle from the design, as security and resilience, up to the operations when facing attacks and breakdowns. The approach is to automate and have a dynamic trust infrastructure that interacts automatically with the security infrastructure. So the authorisations, exceptions and more generally all the security management are done by the system itself. This is the goal of the trust platform we propose. The purpose is to go with and reinforce the security and resilience of the networks, IT infrastructure, systems and services. The trust models components : Definition of the trust itself. total, partial, delegated; Design of the various trust models (based on reputation, frequenting or surveillance, security or redundancy mechanisms) for systems, networks, services, hardware or software component, architecture, Specification of the protocols to install the trust, Definition of the parameters to measure the trust in real time in a system, Estimation of the trust by a user.
引用
收藏
页码:441 / 446
页数:6
相关论文
共 50 条
  • [41] Construction of Computer Network Security Information Leak-Proof Management System
    Dong, Zejian
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2022, 129 : 257 - 264
  • [42] Delegating Network Security with More Information
    Naous, Jad
    Stutsman, Ryan
    Mazieres, David
    McKeown, Nick
    Zeldovich, Nickolai
    [J]. WREN 2009, 2009, : 19 - 26
  • [43] Network and information systems security - Foreword
    Cuppens, F
    Debar, H
    Bertino, E
    [J]. ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2006, 61 (3-4): : 242 - 244
  • [45] The Research and Exploration of Network Information Security
    Lin, Yang
    [J]. PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 790 - 793
  • [46] Application of WLAN Information Transmission and System Security Technology in the Smart Substation Network
    Xu, Xin
    Lu, Jinxi
    [J]. ADVANCES IN APPLIED MATERIALS AND ELECTRONICS ENGINEERING II, 2013, 684 : 551 - +
  • [47] Network security system for health and medical information using smart IC card
    Kanai, Y
    Yachida, M
    Yoshikawa, H
    Yamaguchi, M
    Ohyama, N
    [J]. MEDICAL IMAGING 1998 - PACS DESIGN AND EVALUATION: ENGINEERING AND CLINICAL ISSUES, 1998, 3339 : 23 - 30
  • [48] Construction of Computer Network Security Information Leak-Proof Management System
    Dong, Zejian
    [J]. FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE IOT ERA (FONES-IOT 2021), VOL 1, 2022, 129 : 257 - 264
  • [49] INTELLIGENT INFORMATION NETWORK SECURITY AND MANAGEMENT
    Yixian Yang
    Zhongshan Zhang
    Wenjing Li
    [J]. China Communications, 2016, 13 (07) : 3 - 6
  • [50] A regional information network: Management and security
    Beuscart, RJ
    Delerue, D
    Souf, A
    [J]. PROCEEDINGS OF THE 20TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOL 20, PTS 1-6: BIOMEDICAL ENGINEERING TOWARDS THE YEAR 2000 AND BEYOND, 1998, 20 : 1174 - 1176