Network Security Based on Component for Information Network
DOI:
https://doi.org/10.51983/ajcst-2019.8.S1.1986Keywords:
Component, Info-Net, Trust Domain, Security, Security Control, ArchitectureAbstract
It is a difficult building to ensure the security of data arrange, so it is important to consider out a new security control design and model in the viewpoint of foundational control. As indicated by the attributes and security requests of data net, another security control viewpoint and its engineering dependent on parts is proposed, the security control framework is made-up, and insights regarding the structure of control system, its different kinds, and capacities and spread methods of security control parts are presented, at that point the highlights of the control framework are outlined at last.
References
"Dark Reading: Automating Breach Detection for the Way Security Professionals Think," October 1, 2015.
W. Stallings and L. Brown, Computer Security: Principles and Practice, 3/e, Prentice Hall, Zhang Haixia, Lian Yifeng, Su Purui, and Feng Dengguo, 2014.
M. Stamp, Information Security: Principles and Practice, 2/e, Wiley, 2011.
M. Goodrich and R. Tamassia, Introduction to Computer Security, Addison-Wesley, 2010.
Zhang Haixia, Lian Yifeng, Su Purui, and Feng Dengguo, "Security-state-Region-Based Model of Network Security Evaluation," Journal of Software, vol. 20, no. 2, pp. 451-461, Feb. 2009.
Feng Dongqing, Sun Changfeng, and Fei Minrui, "Research on a New LMS Algorithm with Variable StepLength," Process Automation Instrumentation, Shanghai, China, vol. 7, pp. 67-69, 2007.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.