期刊文献+

基于云计算的智慧政务安全体系设计研究 被引量:10

Security Architecture for Smart Government based on Cloud Computing
下载PDF
导出
摘要 简述了智慧政务云的重要性,云计算面临的安全问题与挑战,智慧政务云信息安全的重要性与必要性。依据国家电子政务信息安全与信息系统安全等级保护相关规范,确定了智慧政务云信息安全防护等级,设计了信息安全防护体系,阐述了安全域划分的原则与方法,并进行了划分。根据云计算的服务模式,分别从IaaS层、PaaS层、Saa层分析了存在的安全风险,提出了安全防护方法、实现技术、注意事项。构筑智慧政务云全方位的信息安全防护体系,需要从技术、管理、服务三者相结合才能实现。 This paper briefly describes the infosec importance of smart government cloud, the security prob- lems and challenges of cloud computing, the infosec importance and necessity of smart government cloud. In accordance with the related specifications of e-government security and classified protection of informa- tion system, the infosec protection classification of smart government cloud is established, the infosec pro- tection architecture designed, and the division principle and method of security domain expounded. Based on cloud computing service mode, the existing security risks are analyzed respectively from IaaS, PaaS and SaaS , and the methods implementation technology and the concerned matters of security protection also presented. Only in combination of technology, management and service, can a comprehensive infosec pro- tection architecture of smart government cloud be realized.
出处 《通信技术》 2016年第4期462-468,共7页 Communications Technology
关键词 云计算 智慧政务 信息安全等级防护 安全域 cloud computing smart government InfoSec classified protection security domain
  • 相关文献

参考文献19

二级参考文献64

  • 1王娜,方滨兴,罗建中,刘勇.“5432战略”:国家信息安全保障体系框架研究[J].通信学报,2004,25(7):1-9. 被引量:36
  • 2杨涛,沈昌祥,陈福接.一个用于安全操作系统特权管理的改进Bell-La Padula模型[J].计算机研究与发展,1993,30(1):45-49. 被引量:7
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1

共引文献1116

同被引文献56

引证文献10

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部