Information and network system security

被引:0
作者
Hartescu, Florin [1 ]
Nicolaescu, Stefan-Victor [1 ]
机构
[1] Natl Inst R&D Informat ICI, Res & Dev, 8-10 Maresal Alex,Averescu Ave,Sector 1, Bucharest, Romania
来源
PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON MATHEMATICAL AND COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING (MACMESE '07)/ DNCOCO '07 | 2007年
关键词
information security; wireless; Wi-Fi network; IT infrastructure; SSL;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today all the systems that manage the security are characterized by the complexity of their major functions like identification, authentication, access control and data protection. The implementation of these functions is usually and objectively based on a trusted model that uses a trusted architecture, which is the platform of the security architectures. The purpose of a such platform is to work on the trust IT infrastructures in all the steps of their life cycle from the design, as security and resilience, up to the operations when facing attacks and breakdowns. The approach is to automate and have a dynamic trust infrastructure that interacts automatically with the security infrastructure. So the authorisations, exceptions and more generally all the security management are done by the system itself. This is the goal of the trust platform we propose. The purpose is to go with and reinforce the security and resilience of the networks, IT infrastructure, systems and services. The trust models components : Definition of the trust itself. total, partial, delegated; Design of the various trust models (based on reputation, frequenting or surveillance, security or redundancy mechanisms) for systems, networks, services, hardware or software component, architecture, Specification of the protocols to install the trust, Definition of the parameters to measure the trust in real time in a system, Estimation of the trust by a user.
引用
收藏
页码:441 / 446
页数:6
相关论文
共 11 条
  • [1] HAUSLEIN A, 1991, MODELLING SIMULATION, V8, P257
  • [2] Ivan I., 2006, INFORM SECURITY HDB
  • [3] NICOLAESCU SV, 2007, 8 INT C INF EC INF K
  • [4] NICOLAESCU SV, 2006, 802XX IEEE
  • [5] NICOLAESCU SV, 2005, C MURESAN M CIURTIN
  • [6] NUSSBAUMER H, 1990, COMPUTER COMMUNICATI
  • [7] Selic B., 1996, CHALLENGES REAL TIME
  • [8] TANENBAUM SA, COMPUTER NETWORKS
  • [9] WANG W, DESIGNING SECURE MEC
  • [10] 1996, 237 ETSI ETR