DocumentCode :
3480581
Title :
A comprehensive security policy research on web information system
Author :
Wang, Fengying ; Li, Caihong ; Zhao, Lei ; Li, Xiumei
Author_Institution :
Sch. of Comput. Sci. & Technol., Shandong Univ. of Technol., Zibo, China
fYear :
2009
fDate :
5-7 Aug. 2009
Firstpage :
1776
Lastpage :
1780
Abstract :
In order to solve security problems in web-based information systems in the large-scale distributed environment, we design a comprehensive security policy. We realize the single entry mechanism of multi-system access by using the single-sign-on, create identity authentication mechanism of high-reliability and security based on China´s second-generation ID card. We also propose the cross-domain setup and its strategies for the access from scattered information systems. This paper will show the access control policy which combines dynamic and static methods, bring up a combination of coarse-grained and fine-grained access control strategy through refining digital objects, operations and rights. Besides we realize encrypted data communication for VPN by using SSL encryption technology to make data encapsulation. Considering the database security, we adopt access control technology, separation control technology, encryption technology, data flow control technology, reasoning control technology and backup technology. We then track and check all users who accessed or tried to access the system by using the system audit, use the triple-right separation mechanism for reliable management to avoid the abuse of powerful rights owned by the system administrator.
Keywords :
Internet; authorisation; cryptography; data encapsulation; database management systems; message authentication; virtual private networks; China second-generation ID card; SOS technology; SSL encryption technology; VPN; Web information system security policy; backup technology; coarse grained access control strategy; cross-domain setup; data encapsulation; data flow control technology; database security; distributed environment; dynamic/static method; encrypted data communication; fine-grained access control strategy; identity authentication mechanism; multisystem access; reasoning control technology; reliable management; secure socket layer technology; separation control technology; single entry mechanism; single-sign-on technology; system administrator; triple-right separation mechanism; trust management; Access control; Authentication; Communication system control; Cryptography; Data communication; Information security; Information systems; Large-scale systems; Power system reliability; Scattering; cross-domain access; identity authentication; single-sign-on; system audit; trust management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Automation and Logistics, 2009. ICAL '09. IEEE International Conference on
Conference_Location :
Shenyang
Print_ISBN :
978-1-4244-4794-7
Electronic_ISBN :
978-1-4244-4795-4
Type :
conf
DOI :
10.1109/ICAL.2009.5262671
Filename :
5262671
Link To Document :
بازگشت