期刊文献+

基于业务流程数据敏感级别的电网企业数据安全研究 被引量:4

Enterprise Data Security Based on Sensitivity of Business Process Data
下载PDF
导出
摘要 结合电网企业在实施数据防泄漏项目的过程中,遇到数据生命周期安全状况不明确,数据分类分级制度难以落地,DLP策略制定过于依赖个人主观决策等问题,针对这些问题,提出一套符合电网数据生命周期安全的方法论,设计了符合电网企业的数据分类分级标准,能够较为客观的指导电网企业数据分级分类工作和DLP策略的制定,提升数据防泄漏工作的效率,使数据防泄漏工作更加规范化、标准化。 Combining data lifecycle security grid enterprises in the implementation of data leakage prevention project encountered no clear data classification and grading system hard landing, DLP strategy development too dependent on subjective decision-making issue, in line with a set of grid data life periodic safety methodology,designed in line with the power grid enterprise data classification and grading standards, guidance can be more objective classification of enterprise data classification grid and the development of DLP strategy, greatly enhance the efficiency of data leakage prevention work,make work more standardized data leakage prevention,standardization.
出处 《机电工程技术》 2015年第5期48-51,共4页 Mechanical & Electrical Engineering Technology
关键词 电网数据安全 数据防泄漏 分类分级 业务流程梳理 ata security data leakage prevention classification and grading business process carding
  • 相关文献

参考文献7

二级参考文献25

  • 1[2]J Anderson.Information Security in a multi-user computer environment[J].Advances in Computers,1973,(12):1-35 被引量:1
  • 2[3]G Stoneburger.Information system security engineering principles-initial draft outline[OL].http://csrc.nist.gov/publications/drafts/issep-071800.doc,2000 被引量:1
  • 3[4]D E Bell,L J LaPadula.Secure computer systems:Mathematical foundations[R].MITRE Corporation,Tech Rep:MTR-2547,1973 被引量:1
  • 4[5]D E Bell,L J LaPadula.Secure computer system:Unified exposition and multics interpretation[R].MITRE Corporation,Tech Rep:MTR-2997,1976 被引量:1
  • 5[8]M Atallah,M Blanton,N Fazio,et al.Dynamic and efficient key management for access hierarchies[C].CCS'05,Alexandria,Virginia,USA,2005 被引量:1
  • 6[9]R Sandhu.Engineering authority and trust in cyberspace:The OM-AM and RBAC way[C].In:Proc of the 5th ACM Workshop on Role-Based Access Control (RBAC-00).New York:ACM Press,2000.111-119 被引量:1
  • 7[10]A Shamir.Identity-based cryptosystems and signature schemes[C].In:Proc of CRYPTO'84.Berlin:Springer-Verlag,1985.47-53 被引量:1
  • 8[12]D Boneh,M Franklin.Identity-based encryption from the Weil pairings[C].In:Advances in Cryptology-Crypto 2001.Berlin:Springer-Verlag,2001.213-229 被引量:1
  • 9[13]TCG Group.TPM Main Specification,Version 1.2[OL].http://www.trustedcomputinggroup.org,2003 被引量:1
  • 10Michael E.Whitman信息安全原理[M].重庆:重庆大学出版社,2005. 被引量:1

共引文献44

同被引文献26

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部