Security grid technology based on information security control theory

被引:0
|
作者
Yuan, Jia-Bin [1 ]
Gu, Kai-Kai [1 ]
Yao, Li [1 ]
机构
[1] College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
关键词
Computer networks - Control theory - Internet;
D O I
暂无
中图分类号
学科分类号
摘要
Combined with the research on grid system security problem, the shortcomings of traditional GSI and gird system and its security are analyzed. In view of the demands of improving its expandability and dynamic behavior, the information security control theory is presented. Its theory foundation and concrete contents are introduced. A security grid model based on the information security control theory is studied and completed. In the security grid model with feedback function, security control strategy, authentication modulo and control modulo are established. This can improve the expandability of grid system and its dynamic behavior. The security grid technology proposed here can provide a new way of thinking for the improvement of grid security.
引用
收藏
页码:422 / 425
相关论文
共 50 条
  • [21] Confidentiality and security in information technology
    Lefton, AB
    GENERATIONS-JOURNAL OF THE AMERICAN SOCIETY ON AGING, 1997, 21 (03): : 50 - 52
  • [22] PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
    HIGHLAND, HJ
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 440 - 446
  • [23] Standardization in Information Technology Security
    Fal’ O.M.
    Cybernetics and Systems Analysis, 2017, 53 (1) : 78 - 82
  • [24] Component based security control for information network
    Wang, Yu
    Lu, Jun
    Wu, Zhongwang
    Lu, Yu
    2006 IMACS: MULTICONFERENCE ON COMPUTATIONAL ENGINEERING IN SYSTEMS APPLICATIONS, VOLS 1 AND 2, 2006, : 1357 - +
  • [25] Perspectives in information technology security
    Highland, H.J.
    Proceedings of the IFIP World Computer Congress, 1992, 2
  • [26] Quantum information security technology
    Zhao, Sheng-Mei
    Yao, Jia
    Li, Fei
    Zheng, Bao-Yu
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2005, 25 (03): : 1 - 7
  • [27] Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
    Yang, Aimin
    Li, Yifan
    Kong, Fanbei
    Wang, Guoqing
    Chen, Enhong
    IEEE ACCESS, 2018, 6 : 50187 - 50196
  • [28] Physical Information Security Technology Based on Photonic Nanostructures
    Xue, Jiancai
    Zhou, Changda
    He, Guoli
    Li, Siyang
    Zhou, Zhangkai
    CHINESE JOURNAL OF LASERS-ZHONGGUO JIGUANG, 2023, 50 (18):
  • [29] Design of DRM System Based on the Information Security Technology
    Liang, Zhengli
    Cai, Dongmei
    2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA), 2014, : 335 - 341
  • [30] Research on Information Security Internal Control Mechanism of Intelligent Electric Grid
    Gao Feng
    Qin Long
    Yang Ying
    Dang Fangfang
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 516 - 519