A Network Business Security Model Based on Developed BLP Model in Electric Power Enterprise

被引:0
|
作者
Zhang, Tong [1 ]
Wu, Kehe [1 ]
Ma, Gang [1 ]
Li, Wei [1 ]
机构
[1] N China Elect Power Univ, Control & Comp Engn Sch, Beijing, Peoples R China
来源
PRZEGLAD ELEKTROTECHNICZNY | 2012年 / 88卷 / 3B期
关键词
Information Security; Network Business Security; BLP Model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security defense of Electric Power Information Network should focus on the security of network business running on Intranet. In order to meet the special requirements of network business security in Electric Power Information Network, the access rules of network business between different security levels are researched, and a network business security model based on developed BLP model is proposed. By re-definiting the trusted subjects of BLP model, the network business security model can meet the access rules of network business between diffident security level.
引用
收藏
页码:63 / 66
页数:4
相关论文
共 50 条
  • [41] The Research of Enterprise's Business Model based on Systemic View
    Wang Xiaoming
    Li Shiming
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 881 - 884
  • [42] Business model prototyping for electric mobility and solar power solutions
    Laurischkat, Katja
    Jandt, Daniel
    23RD CIRP CONFERENCE ON LIFE CYCLE ENGINEERING, 2016, 48 : 307 - 312
  • [43] Construction of Software Enterprise SaaS-based Business Model
    Liao, Hancheng
    Tao, Changqi
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 62 - +
  • [44] An optimization model of enterprise business processes based on house of quality
    Sun Dong-Sheng
    Wang Feng-Xia
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (14TH) VOLS 1-3, 2007, : 966 - 971
  • [45] Model-Based Cyber Security at the Enterprise and Systems Level
    Brooks, Mitchell
    Hause, Matthew
    INCOSE International Symposium, 2023, 33 (01) : 649 - 665
  • [46] Model-based risk assessment to improve enterprise security
    Aagedal, JO
    den Braber, F
    Dimitrakos, T
    Gran, BA
    Raptis, D
    Stolen, K
    SIXTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2002, : 51 - 62
  • [47] Electric power network planning based on multi-object optimization model
    Ye, Linhao
    2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 454 - 458
  • [48] Cross-Enterprise Policy Model for e-Business Web Services Security
    Ishaya, Tanko
    Nurse, Jason R. C.
    INFORMATION SECURITY AND DIGITAL FORENSICS, 2010, 41 : 163 - +
  • [49] A Maturity Model of Enterprise Business Intelligence
    Tan, Chee-Sok
    Sim, Yee-Wai
    Yeoh, William
    KNOWLEDGE MANAGEMENT AND INNOVATION: A BUSINESS COMPETITIVE EDGE PERSPECTIVE, VOLS 1-3, 2010, : 20 - 29
  • [50] A business model for managing the virtual enterprise
    Walters, D
    VIRTUAL ENTERPRISES AND COLLABORATIVE NETWORKS, 2004, 149 : 273 - 280