• DocumentCode
    3480581
  • Title

    A comprehensive security policy research on web information system

  • Author

    Wang, Fengying ; Li, Caihong ; Zhao, Lei ; Li, Xiumei

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Shandong Univ. of Technol., Zibo, China
  • fYear
    2009
  • fDate
    5-7 Aug. 2009
  • Firstpage
    1776
  • Lastpage
    1780
  • Abstract
    In order to solve security problems in web-based information systems in the large-scale distributed environment, we design a comprehensive security policy. We realize the single entry mechanism of multi-system access by using the single-sign-on, create identity authentication mechanism of high-reliability and security based on China´s second-generation ID card. We also propose the cross-domain setup and its strategies for the access from scattered information systems. This paper will show the access control policy which combines dynamic and static methods, bring up a combination of coarse-grained and fine-grained access control strategy through refining digital objects, operations and rights. Besides we realize encrypted data communication for VPN by using SSL encryption technology to make data encapsulation. Considering the database security, we adopt access control technology, separation control technology, encryption technology, data flow control technology, reasoning control technology and backup technology. We then track and check all users who accessed or tried to access the system by using the system audit, use the triple-right separation mechanism for reliable management to avoid the abuse of powerful rights owned by the system administrator.
  • Keywords
    Internet; authorisation; cryptography; data encapsulation; database management systems; message authentication; virtual private networks; China second-generation ID card; SOS technology; SSL encryption technology; VPN; Web information system security policy; backup technology; coarse grained access control strategy; cross-domain setup; data encapsulation; data flow control technology; database security; distributed environment; dynamic/static method; encrypted data communication; fine-grained access control strategy; identity authentication mechanism; multisystem access; reasoning control technology; reliable management; secure socket layer technology; separation control technology; single entry mechanism; single-sign-on technology; system administrator; triple-right separation mechanism; trust management; Access control; Authentication; Communication system control; Cryptography; Data communication; Information security; Information systems; Large-scale systems; Power system reliability; Scattering; cross-domain access; identity authentication; single-sign-on; system audit; trust management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Automation and Logistics, 2009. ICAL '09. IEEE International Conference on
  • Conference_Location
    Shenyang
  • Print_ISBN
    978-1-4244-4794-7
  • Electronic_ISBN
    978-1-4244-4795-4
  • Type

    conf

  • DOI
    10.1109/ICAL.2009.5262671
  • Filename
    5262671