A Trusted Process Security Model for the Access to Power Enterprise Data Center
Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.
K. H. Wu et al., "A Trusted Process Security Model for the Access to Power Enterprise Data Center", Advanced Materials Research, Vols. 341-342, pp. 472-477, 2012