Paper Title:
A Trusted Process Security Model for the Access to Power Enterprise Data Center
  Abstract

Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.

  Info
Periodical
Advanced Materials Research (Volumes 341-342)
Edited by
Liu Guiping
Pages
472-477
DOI
10.4028/www.scientific.net/AMR.341-342.472
Citation
K. H. Wu, H. J. Ji, L. Chen, T. Zhang, "A Trusted Process Security Model for the Access to Power Enterprise Data Center", Advanced Materials Research, Vols. 341-342, pp. 472-477, 2012
Online since
September 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xiao Ying Gan, Bin Liu
Abstract:Based on the TNC architecture, using a trusted network of repair techniques in the trusted network access scenario does not meet the...
713
Authors: Qiong Long, Zhi Fang Huang, Jin Fan Zhang
Chapter 3: Advanced Digital Enterprise
Abstract:Intelligent transportation integrated access system can significantly improve the security of computer network systems, while trusted...
370
Authors: Song Deng, Wei Min Lin, Tao Zhang, Yuan Yuan Ma
Chapter 19: Software Development and Mathematical Modeling
Abstract:With the development of interactive business for smart grid, for the security access requirement of kinds of business terminal, this paper...
2659
Authors: Ya Qin Fan, Ge Zhang, Fei Fei Li, Xin Zhang
Chapter 3: Information Technologies, WEB and Networks Engineering, Information Security, E-Engineering, Software Application and Development
Abstract:Abstract: in order to solve the access control system loopholes, can appear the problem of chaotic management, security failure and conflict...
1299