DocumentCode
3480581
Title
A comprehensive security policy research on web information system
Author
Wang, Fengying ; Li, Caihong ; Zhao, Lei ; Li, Xiumei
Author_Institution
Sch. of Comput. Sci. & Technol., Shandong Univ. of Technol., Zibo, China
fYear
2009
fDate
5-7 Aug. 2009
Firstpage
1776
Lastpage
1780
Abstract
In order to solve security problems in web-based information systems in the large-scale distributed environment, we design a comprehensive security policy. We realize the single entry mechanism of multi-system access by using the single-sign-on, create identity authentication mechanism of high-reliability and security based on China´s second-generation ID card. We also propose the cross-domain setup and its strategies for the access from scattered information systems. This paper will show the access control policy which combines dynamic and static methods, bring up a combination of coarse-grained and fine-grained access control strategy through refining digital objects, operations and rights. Besides we realize encrypted data communication for VPN by using SSL encryption technology to make data encapsulation. Considering the database security, we adopt access control technology, separation control technology, encryption technology, data flow control technology, reasoning control technology and backup technology. We then track and check all users who accessed or tried to access the system by using the system audit, use the triple-right separation mechanism for reliable management to avoid the abuse of powerful rights owned by the system administrator.
Keywords
Internet; authorisation; cryptography; data encapsulation; database management systems; message authentication; virtual private networks; China second-generation ID card; SOS technology; SSL encryption technology; VPN; Web information system security policy; backup technology; coarse grained access control strategy; cross-domain setup; data encapsulation; data flow control technology; database security; distributed environment; dynamic/static method; encrypted data communication; fine-grained access control strategy; identity authentication mechanism; multisystem access; reasoning control technology; reliable management; secure socket layer technology; separation control technology; single entry mechanism; single-sign-on technology; system administrator; triple-right separation mechanism; trust management; Access control; Authentication; Communication system control; Cryptography; Data communication; Information security; Information systems; Large-scale systems; Power system reliability; Scattering; cross-domain access; identity authentication; single-sign-on; system audit; trust management;
fLanguage
English
Publisher
ieee
Conference_Titel
Automation and Logistics, 2009. ICAL '09. IEEE International Conference on
Conference_Location
Shenyang
Print_ISBN
978-1-4244-4794-7
Electronic_ISBN
978-1-4244-4795-4
Type
conf
DOI
10.1109/ICAL.2009.5262671
Filename
5262671
Link To Document