会议专题

A Trusted Process Security Model for the Access to Power Enterprise Data Center

Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center.The model gives the concept of Trusted Process firstly, and then builds Trusted Process List and the Process Access List to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.

trusted process security model access control data center

WU Kehe Jl Hongjiang CHEN Long ZHANG Tong

School of Control and Computer Engineering,North China Electric Power University,Beijing 102206,China

国际会议

2011 2nd International Conference on Material and Manufacturing Technology(2011第二届材料与制造技术国际会议 ICMMT2011)

厦门

英文

472-477

2011-07-08(万方平台首次上网日期,不代表论文的发表时间)