Security Model Based on Network Business Security
Wu Kehe, Zhang Tong, Li Wei, Ma Gang
Department of Computer Science and Technology North China Electric Power University Beijing, China epuwkh@126.com, zhtzhangtong@163.com, liwei@ncepu.edu.cn, hdmagang@163.com
Abstract—Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of Enterprise Network Information System, this paper proposes the "network business security" concept. In this paper, the object of data information security is defined in three parts security, network system security and network business security, and the network business security model is described. The proposal of the concept "network business security" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system. Keywords-Information Security, Network Business Security, Network Business Security Model
I.
INTRODUCTION
Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security
References: [1] YuNing Wang. Current Situation and Defense of Network Information Security[J]. Modern Commerce Industry , 2008 [2] DongHui Jiang. Security Offense and Defense Testing and Analysis of LAN[J]. Science&Technology Information, 2009 [3] XingHua Chen. Enterprise Network Information Security and Countermeasure Study[J]. Agriculture Network Information ,2009 [4] Chi Hu. Strategy Choice of Enterprise Information Construction.[J]. China Science&Technology Investment,2009 [5] YuanFei Huang, LiYong Ji, LiPing Jin. Investigation of Network Information Security Situation and Hot Issues[J]. Telecommunications Science, 2009 [6] Chao Li. Simple Exploration of Network Information Security[J]. Scientific&Technological Information Development and Economic, 2009 [7] D.E.Bell, L.LaPaDula. Secure Computer Systems: Mathematical Foundations and Model[J]. Technical Report M74 244, Mitre Corp. , Bedford, MA, May 1973. [8] K. J. Biba. Integrity Consideration for Secure Computer Systems[J]. Technical Report ESD-TR-76-372,Mitre Corp. , Bedford, MA, April 1979. [9] Winn Schwartau. Time-Based Security Explained: Provable Security Models and Formulas for the Practitioner and Vendor[J]. Computer&Security, USA, 1998:693~714. [10] HongSheng Yan, XueLi Wang, Jun Yang. Computer Network Security and Defense[M]. Beijing: Electronics Industry Press,2007 [11] R.Sandhu,V.Bhamidipati,E.Coyne. The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline. In Proceedings of Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, 1997:41~49. [12] GuangQiong Wang. Comprehensive Study of Access Control Based on GFAC[J]. Journal of AnQing Teachers College,2004 Figure 1 Existing Theory of Information Security System Figure 2 The Information Security System Based on Data, Network and Network Busine 580 Authorized licensed use limited to: NWFP UNIV OF ENGINEERING AND TECHNOLOGY. Downloaded on June 15,2010 at 09:10:07 UTC from IEEE Xplore. Restrictions apply.