Security Model Based on Network Business Security



Similar documents
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

A Network Simulation Experiment of WAN Based on OPNET

A Scheme for Implementing Load Balancing of Web Server

Research on Operation Management under the Environment of Cloud Computing Data Center

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Framework of Information Management System for Construction Projects

HUMAN-COMPUTER INTERFACE DEVELOPMENT OF WIRELESS MONITORING SYSTEM BASED ON MINIGUI

Demand Forecasting Optimization in Supply Chain

Operation and Maintenance Management Strategy of Cloud Computing Data Center

Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine

One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)

On the Development of Web-based Distance Physical Education

Studying on Construction Programs of the Platform of Primary Products Marketing

The study on the Human Resource Management of the Logistics Enterprises Based On the Competency Model

Design of Data Archive in Virtual Test Architecture

A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN

PERSONALIZED WEB MAP CUSTOMIZED SERVICE

A Case Study of Question Answering in Automatic Tourism Service Packaging

Food Safety Control from the Perspective of Supply Chain

Comparison Control Strategies for ISG hybrid electric vehicle. Hailu Tang 1, a

Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net

Network Attack Platform

Supply Chain Quality Management Based on Information Asymmetry

How to use Ez Trade Builder

An Advanced Commercial Contact Center Based on Cloud Computing

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Enterprise Architecture in Banking

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

Strategies for Developing a Document Imaging & Electronic Retention Program

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Analysis of China Motor Vehicle Insurance Business Trends

Cloud Security - Characteristics, Advantages and Disadvantages

On-line Payment and Security of E-commerce

On the Development of College Student Information Management System

HOW TO START WORKING WITH P2WARE PROJECT MANAGER 7?

Research on the UHF RFID Channel Coding Technology based on Simulink

A practical and novel standard addition strategy to screen. pharmacodynamic components in traditional Chinese medicine using

AN IMPROVED CREDIT SCORING METHOD FOR CHINESE COMMERCIAL BANKS

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course

Statistical process control analysis based on software Q-das

UPS battery remote monitoring system in cloud computing

Construction of Library Management Information System

Procedure for Master s Degree Thesis Defense, Graduate Institute of Art History, National Taiwan Normal University

Research and Implementation of Customizable Dynamic Website Management System

Longmai Mobile PKI Solution

MODERN EDUCATION TECHNOLOGY WITH CREATIVITY OF CONTINUING EDUCATION

Research Article. Research of network payment system based on multi-factor authentication

DEVELOPMENT OF A WEB-BASED WIRELESS TELEMONITORING SYSTEM FOR AGRO- ENVIRONMENT

Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm

Introduction to Leadership and Management of. Non-profit Organizations. Syllabus

A Research and Practice of Agile Unified Requirement Modeling

A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem

Research on small and medium enterprises financing mode based on supply chain finance

Commercial software development with the help of J2EE architecture and MVC

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Data Mining in the Application of Criminal Cases Based on Decision Tree

The Evaluation Model of HD Interactive TV Shopping Service

Project Time Management

Boosting SMEs with Better and Innovative Financing Services

BTBU Master of Control Theory and Control Engineering

OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

The Application of 360 +KPI Performance Evaluation Model in Chinese and Western Culture Background

Product data model for PLM system

Build products with visual solution configuration in an integrated quotation management application.

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method

CRM 2013 Workflows. Description

The IFPUG Counting Practices On-Going Effort in Sizing Functional Requirements. Janet Russac

Using flipped classroom as the teaching mode in a Computer Network course

Research on Sports Information Technology Education Platform Based on ASP-NET Technology

Trust but Verify: Authorization for Web Services. The University of Vermont

Real estate investment project risk analysis

The Design and Improvement of a Software Project Management System Based on CMMI

RESEARCH ON THE APPLICATION OF WORKFLOW MANAGEMENT SYSTEM IN COLLABORATIVE PLATFORM FOR ENGLISH TEACHING

Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory

I. INTRODUCTION THE INTELLIGENT TRANSPORTATION MANAGEMENT INFORMATION SYSTEM OF RAILWAY IN CHINA

Development of a Web-based Information Service Platform for Protected Crop Pests

Pattern-based J2EE Application Deployment with Cost Analysis

Transcription:

Security Model Based on Network Business Security Wu Kehe, Zhang Tong, Li Wei, Ma Gang Department of Computer Science and Technology North China Electric Power University Beijing, China

Abstract Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business.

I. INTRODUCTION II. CONCEPT OF NETWORK BUSINESS SECURITY III. DESCRIPTION OF CONCEPT BASED ON NETWORK IV. MODEL OF NETWORK BUSINESS SECURITY V. CONCLUSION

Computer and network technology provide convenience to the people, but at the same time, security problems have emerged and become more and more serious. With the increasing popularity of computer applications, in particular, the rapid development of network technology, more and more security threat have appeared and information security has become a very important and urgent issue to be solved. Network information security has become the fifth security field after sea, land, air and space. I. INTRODUCTION

Existing Theory of Information Security System

First of all, this paper defines the "network business" concept. Network business means enterprise management business or controlling process of Production Automation System running on network. It can be further described as follows: II. CONCEPT OF NETWORK BUSINESS SECURITY

1) It is composed of function program running on network platform, realizing the enterprise management business processes and production control logic. 2) In the network environment, staff work in accordance with logic and rhythm of business management software, or in accordance with process of control logic, which can constitute the realization of the network business. 3) From the computer network system level, network business is composed of network process set, data sets and process operation sequence set. Based on the analysis of network business s concept and features, "network security" is defined as follows: network security means the reliability, stability and real-time of business running on the network, the continuity of business processes and business operation s confidentiality and non-repudiation.

BUSINESS SECURITY Enterprise Information Network is not only the platform for information sharing and information exchanging, but also the platform for enterprise business running on and collaborative operation. Therefore, the Enterprise Information Network security is not only to protect the security of data in network, but also to protect the security of business running on network. III. DESCRIPTION OF CONCEPT BASED ON NETWORK

The Information Security System Based on Data,Network and Network Business

According to the definition of network business and network business security in this paper, we can conclude that network business is composed of the network process sets, data sets and process operation sequence sets. Network business security is the security of network process sets and data sets, more precisely, is the security of network processes running and writing operation on data sets. According to the above description of network business and network business security, this paper describes the network security model specifically as follows: IV. MODEL OF NETWORK BUSINESS SECURITY

a) Process Set: P={p0,p1,p2,;,pn}. pirp, is a process running on Enterprise Infromation Network. b) Data Set: D={d0,d1,d2,;,dm}. djrd$ is the data which processes access to. c) Access Set: F={f0,f1,f2,;,fn}. firf, fi=f(p,d). f(p,d) means the model of process p access to data d. Model Description

e) Business Set: B= (P+,D+,F+,S). A business is composed of all of process which can finish the business, all of data which the business needs, the access property of processes access to data and ordered sequence between these processes. All of businesses compose the whole network application system which the model defendes.

According to the above description of network business and network business security, this paper abstracts the following two properties: Property 1: The defense of data is the defense of writing operation on data, the defense of reading operation on data is not necessary. Property 2: The right ordered sequence between processes which network businesses needed must not be changed. According to the above two properties, the model constraint can be described as follows: Model Constraints

For Property 1: This paper defines pclass(p) as the access class of process p, dclass(d) as the access class of data d. Property 1 can be described as: only if the access class of process p is higher than the access class of data d, process p can write data d. The security formula is: For all prp$drd if wrf(p,d) then pclass(p)>=dclass(d) (1) For Property 2: For any business b, the ordered sequence between processes which business b needs must not be changed. T he security formula is: For all brb S=G(P+)=(P1 + $P2 +,;,Pk +) (2) 3) Definition of Security Status For each business, the all processes and all data must meet the f(p,d) and G(P+) constraint, so we think the business is safe. If all of businesses in the network system is safe, then the application system in network is safe.

On the basis of research on actual needs and current application status of Enterprise Information System network security defense, according to the key points of Enterprise Information System network defense, this paper has proposed the network business security concept by theoretical study and research on information security, dividing protection object of information security into data security, network security and network business security. New information security concept considers network business security as an important protection object in Enterprise Information Network, well explaining special problems in Enterprise Information Systems. This paper specifically addresses the meaning of network business security and gives the formal description of network business security model, providing theoretical basis for security development and planning of Enterprise Information System. V. CONCLUSION