The Research on Key Techniques of Cross-Domain Data Services

被引:0
|
作者
Yin, Xinming [1 ]
Jiang, Haiping [1 ]
Huang, Haiye [1 ]
Bi, Junhao [1 ]
Cao, Zhiwei [1 ]
机构
[1] Minist Publ Secur, Informat Secur Technol Div, Res Inst 3, Shanghai 201204, Peoples R China
关键词
Cross-domain security; Data sharing; Unidirectional transmission; Physical isolation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the deepening development of Internet plus and cloud computing, big data technology constantly breakthrough in the field of application, cyber security becomes an important research field which can't be ignored in the information environment nowadays. Besides, with the development of the business, there are more and more demands on safe and effective data sharing among the different networks and heterogeneous systems. This paper researches the key technologies for cross-domain data services and proposes a cross-domain security data sharing technology. The technology combines physical isolation with proxy service dynamic configuration on data security sharing. Through analysis and verification, the proposed approach is able to carry out data fields and services mapping transformation in heterogeneous system, which can achieve safe and effective data sharing.
引用
收藏
页码:398 / 402
页数:5
相关论文
共 50 条
  • [1] The Research of Cross-domain Usage Control Model in Web Services
    Zhang, Guoping
    Gong, Wentao
    Tian, Jiazheng
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 93 - 97
  • [2] DaGzang: a synthetic data generator for cross-domain recommendation services
    Nguyen, Luong Vuong
    Vo, Nam D.
    Jung, Jason J.
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [3] Cross-Domain Data Fusion
    Yang, Qiang
    [J]. COMPUTER, 2016, 49 (04) : 18 - 18
  • [4] A Cross-domain Data Marketplace for Data Sharing
    Mavrogiorgou, Argyro
    Koukos, Vasileios
    Kouremenou, Eleftheria
    Kiourtis, Athanasios
    Raikos, Alexandros
    Manias, George
    Kyriazis, Dimosthenis
    [J]. PROCEEDINGS OF 2022 THE 3RD EUROPEAN SYMPOSIUM ON SOFTWARE ENGINEERING, ESSE 2022, 2022, : 72 - 79
  • [5] Unsupervised Domain Adaptation with Imbalanced Cross-Domain Data
    Hsu, Tzu-Ming Harry
    Chen, Wei-Yu
    Hou, Cheng-An
    Tsai, Yao-Hung Hubert
    Yeh, Yi-Ren
    Wang, Yu-Chiang Frank
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, : 4121 - 4129
  • [6] Cross-domain authentication and the key agreement protocol in VANETs
    Li X.
    Yang D.
    Zheng X.
    Zhu X.
    Chen B.
    Zhang Y.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 141 - 148
  • [7] Cross-Domain Neurobiology Data Integration and Exploration
    Xuan, Weijian
    Dai, Manhong
    Josh, Buckner
    Mirel, Barbara
    Song, Jean
    Athey, Brian
    Watson, Stanley J.
    Meng, Fan
    [J]. 2009 INTERNATIONAL JOINT CONFERENCE ON BIOINFORMATICS, SYSTEMS BIOLOGY AND INTELLIGENT COMPUTING, PROCEEDINGS, 2009, : 37 - +
  • [8] Cross-domain neurobiology data integration and exploration
    Weijian Xuan
    Manhong Dai
    Josh Buckner
    Barbara Mirel
    Jean Song
    Brian Athey
    Stanley J Watson
    Fan Meng
    [J]. BMC Genomics, 11
  • [9] Modeling Treatment Effect with Cross-Domain Data
    Han, Bin
    Zhang, Ya-Lin
    Yu, Lu
    Chen, Biying
    Li, Longfei
    Zhou, Jun
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PT I, PAKDD 2024, 2024, 14645 : 365 - 377
  • [10] Data Poisoning Attacks on Cross-domain Recommendation
    Chen, Huiyuan
    Li, Jing
    [J]. PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 2177 - 2180