Security grid technology based on information security control theory

被引:0
|
作者
Yuan, Jia-Bin [1 ]
Gu, Kai-Kai [1 ]
Yao, Li [1 ]
机构
[1] College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
关键词
Computer networks - Control theory - Internet;
D O I
暂无
中图分类号
学科分类号
摘要
Combined with the research on grid system security problem, the shortcomings of traditional GSI and gird system and its security are analyzed. In view of the demands of improving its expandability and dynamic behavior, the information security control theory is presented. Its theory foundation and concrete contents are introduced. A security grid model based on the information security control theory is studied and completed. In the security grid model with feedback function, security control strategy, authentication modulo and control modulo are established. This can improve the expandability of grid system and its dynamic behavior. The security grid technology proposed here can provide a new way of thinking for the improvement of grid security.
引用
收藏
页码:422 / 425
相关论文
共 50 条
  • [1] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [2] Grid security and relevant technology
    Tian, JF
    Ma, YK
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 994 - 997
  • [3] Smart Grid Security Technology
    Metke, Anthony R.
    Ekl, Randy L.
    2010 INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2010,
  • [4] Information security technology based on mobile communication technology
    Yi, Yan
    Zhao, QingJiang
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 438 - 441
  • [5] Information technology security
    Elliott, AT
    NUCLEAR MEDICINE COMMUNICATIONS, 2003, 24 (12) : 1205 - 1205
  • [6] Security of Networked Control Systems with Incomplete Information Based on Game Theory
    Gao, Lei
    Sun, Jian
    Li, Jun
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 6701 - 6706
  • [7] Based on the research of WSN in information security technology
    Zhao, Ke
    Xiao, LongFei
    Hu, YaLong
    Wang, Zhong
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5976 - 5978
  • [8] Research on Information Security Technology Based on Blockchain
    Liu, Liang
    Xu, Budong
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2018, : 380 - 384
  • [9] Information security technology based on DNA computing
    Cui, Guangzhao
    Qin, Limin
    Wang, Yanfeng
    Zhang, Xuncai
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 288 - +
  • [10] Information Technology Security Task-Technology Fit Based on the Technology-to-Performance Chain Theory
    Angolano, Carole C.
    SIGMIS CPR 2008: PROCEEDINGS OF THE 2008 ACM SIGMIS CPR CONFERENCE, 2008, : 157 - 160