A Trusted Process Security Model for the Access to Power Enterprise Data Center

Article Preview

Abstract:

Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 341-342)

Pages:

472-477

Citation:

Online since:

September 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] WANG Fei, Liu Yi. Research of Security Architecture and Application of Trusted Computing Platform[J]. Microcomputer Information, 2007, 23(3): 6~78.

Google Scholar

[2] Trusted Computing Group. TPM Main Specification: Design Principles v1. 2 [EB/OL]. https: /www. trustedcomputinggroup. org. Oct (2003).

Google Scholar

[3] ZHANG Xiao-fei, XU Fang, SHEN Chang-xiang. Research on Multilevel Security Model Based on Trustworthy State and Its Application[J]. Acta Electronica Sinica, 2007, 35(8): 1511~1515.

Google Scholar

[4] WU Ke-he, MA Gang, ZHANG Tong. Design and implementation of processes mandatory running control[J]. Journal on Communications, 2009, 10A(30): 150~153.

Google Scholar

[5] XU Shi-yi. Design And Analysis Of Trusted Computing System[M]. Beijing: Tsinghua University Press, (2006).

Google Scholar