Security grid technology based on information security control theory

被引:0
|
作者
Yuan, Jia-Bin [1 ]
Gu, Kai-Kai [1 ]
Yao, Li [1 ]
机构
[1] College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
关键词
Computer networks - Control theory - Internet;
D O I
暂无
中图分类号
学科分类号
摘要
Combined with the research on grid system security problem, the shortcomings of traditional GSI and gird system and its security are analyzed. In view of the demands of improving its expandability and dynamic behavior, the information security control theory is presented. Its theory foundation and concrete contents are introduced. A security grid model based on the information security control theory is studied and completed. In the security grid model with feedback function, security control strategy, authentication modulo and control modulo are established. This can improve the expandability of grid system and its dynamic behavior. The security grid technology proposed here can provide a new way of thinking for the improvement of grid security.
引用
收藏
页码:422 / 425
相关论文
共 50 条
  • [31] Information Security Transmission Technology in Internet of Things Control System
    Zou, Ying
    Lv, Jiezhuo
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (06) : 177 - 190
  • [32] Game Theory and Information Security
    Meng Xianghong
    Wang Xiaoli
    ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +
  • [33] Information Security Theory and Practice
    Vinaja, Robert
    JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2015, 18 (04) : 316 - 318
  • [34] Application of information communication network security management and control based on big data technology
    Du, Meiyan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (05)
  • [35] WAMS Information Security Assessment Based on Evidence Theory
    Liu Wen-xia
    Fan Yong-feng
    Zhang Li-xin
    Zhang Xin
    Que Hua-kun
    2009 INTERNATIONAL CONFERENCE ON SUSTAINABLE POWER GENERATION AND SUPPLY, VOLS 1-4, 2009, : 268 - +
  • [36] Information Security Problem Research Based on Game Theory
    Sun, Wei
    Kong, Xiangwei
    He, Dequan
    You, Xingang
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 554 - 557
  • [37] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44
  • [38] The Design of OA System Border Security Architecture Based on Security Isolation and Information Exchange Technology
    Ji, Jun
    Xing, Fei-Fei
    Zang, Yu-Qing
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 607 - 610
  • [39] A Transient Grid Security Control Algorithm Based on EMS System
    Su, Yang
    Liu, Song
    Liang, Zhihong
    Qiao, Zhizhong
    Li, Xiaodong
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 373 - 382
  • [40] Analysis and Research on the Security Key Technology of Grid
    Longjun, Zhang
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 334 - 338