A Trusted Process Security Model for the Access to Power Enterprise Data Center

Abstract:

Article Preview

Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.

Info:

Periodical:

Advanced Materials Research (Volumes 341-342)

Edited by:

Liu Guiping

Pages:

472-477

DOI:

10.4028/www.scientific.net/AMR.341-342.472

Citation:

K. H. Wu et al., "A Trusted Process Security Model for the Access to Power Enterprise Data Center", Advanced Materials Research, Vols. 341-342, pp. 472-477, 2012

Online since:

September 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.