Title :
Research on data and workflow security of electronic military systems
Author :
Wei Wang ; Haining Luo ; Huiyu Deng
Author_Institution :
Key Lab. on Inf. Security, Eng. Univ. of CAPF, Xi´an, China
Abstract :
Based upon the command and control network infrastructure of the Army, now electronic military systems are being built to store, transfer, query and manipulate data for various military tasks. However, in the open and interconnected network environment, military systems are facing two main typical security threats, i.e., broken authentication and broken access control. This paper proposes an idea of building a security Web-based electronic military system by utilizing network security trust units. An authorization component based on PKI (Public Key Infrastructure) and LDAP (Lightweight Directory Access Protocol), as well as an access control component based on T-RBAC (Task-Role Based Access Control) are designed. The implemented security components are embedded into an online manuscript submission and editing system for CAPF (Chinese Armed Police Force) newspaper office to ensure data and workflow security. Practical application shows the implemented security components can effectively guarantee the security and reliability of the system.
Keywords :
authorisation; command and control systems; military systems; public key cryptography; query processing; reliability; security of data; CAPF newspaper office; Chinese Armed Police Force; LDAP; PKI; T-RBAC; access control component; authorization component; broken access control; broken authentication; command and control network infrastructure; data security; electronic military systems; interconnected network environment; lightweight directory access protocol; military tasks; network security trust units; online manuscript submission and editing system; open network environment; public key infrastructure; security Web-based electronic military system; security threats; task-role based access control; workflow security; Authentication; Authorization; Business; Computational modeling; Permission; Data Security; Informationization; T-RBAC; Workflow Management;
Conference_Titel :
Intelligent Control and Information Processing (ICICIP), 2013 Fourth International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4673-6248-1
DOI :
10.1109/ICICIP.2013.6568164