期刊文献+

基于社会智能的网络信息流安全环模型

A Closed Security-Ring Model for Network Information Flow Based on Social Intelligence
下载PDF
导出
摘要 基于人类的社会智能特征,提出了一种网络信息流安全环模型.该模型分4个层次控制网络信息流的动态安全:安全入口层负责用户的身份验证和信息流的安全封装;社会智能层赋予信息流自我感应、自我保护、自我调控的行为能力;事务层实现商业事务的提交、处理、回滚,提供实时保护和在线恢复机制;TCP/IP安全协议层则保障网络信息流的安全传输.这4个层次协同运作,构建了不同等级的安全环.通过数学模型的建立和论证,证明该模型可以有效地保障网络信息流的动态安全,为商业事务的整体安全提供了一种可行的解决方案. This paper puts forward a security-ring model for network information flow based on human social intelligence. The model controls the dynamic security of network information flow on four layers: Security entrance layer requires user authentication and encapsulates security information flow; Social intelligence layer makes information flow to have the ability of self-sensing self-protecting and self-adjusting; Business layer carries out business logic in forms of transactions which can be submitted, processed and roll back, in order to provide real-time protecting and online recovering; TCP/IP security layer ensures security communication for information flow. These four security layers corporately run to build different grades of security-rings. By establishing mathematics model and reasoning, it is verified that the model can effectively guarantee dynamical security of network information flow and provide a feasible method for the whole business security.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2006年第5期537-540,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(60534020 60474037) 教育部新世纪优秀人才支持计划(NCET-04-415)资助项目
关键词 信息流 社会智能 安全环 网络安全 information-flow social intelligence security-ring network security
  • 相关文献

参考文献10

  • 1Goguen J, Meseguer J. Security Policies and Security Models[C]//Proceeding of IEEE Symposium on Security and Privacy. New York: IEEE Press, 1982,7(2) :11-20. 被引量:1
  • 2Denning D. A Lattice Model of Secure Information Flow[J]. Communications of the ACM, 1976,19 ( 5 ) :236-243. 被引量:1
  • 3Sabelfeld A, Myers A. Language-Based Information-Flow Security[J]. IEEE Journal on Selected Areas in Communications, 2003,21 ( 1 ) : 5-19. 被引量:1
  • 4Myers C, Nystrom N, Zheng L, et al. Jif : Java Information Flow, Software Release [EB/OL]. [2005-07-08].http://www.cs. cornell.edu/jif. 被引量:1
  • 5Simonet V. Flow Carol in a Nutshell[C]//Proceedings of the First APPSEM-II Workshop. Graham Hutton:IEEE Press,2003,1(1) :152-165. 被引量:1
  • 6Zdancewic S. Challenges for Information-Flow Security [C]//Proceedings of the Second APPSEM-II Workshop. New York: IEEE Press, 2004,2 ( 1 ) : 124-129. 被引量:1
  • 7Ruyter D, Saini B. Assessing the Effects of Building Social Intelligence in A Robotic Interface for the Home[J]. Interactive Compute, 2005,17(5) : 522-541. 被引量:1
  • 8Farme W, Guttman J, Swarup V. Security for Mobile Agents: Authentication and State Appraisal[C]//Proceedings of the Computer Security ESORICS' 96.Lecture Notes in Computer Science, New York:Springer Press, 1996 : 118-130. 被引量:1
  • 9Necula G, Safe P. Untrusted Agents Using Proof-carrying Code [C]//Lecture Notes in Computer Science 1419. New York : Springer Press, 1998:61-91. 被引量:1
  • 10Roth V. Secure Recording of Itineraries Through Cooperating Agents[EB/OL]. [2005-07-08]. http://cuiwww.unige.ch/-ecoopws/ws98/ papers/vroth98c.ps. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部