ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2018, Vol. 55 ›› Issue (12): 2637-2650.doi: 10.7544/issn1000-1239.2018.20170773

Previous Articles     Next Articles

The Trust Interconnection Control Model of E-Government Network Construction

Chen Zhonglin1, Shan Zhiguang2, Xiao Guoyu3, Chen Shanzhi1   

  1. 1(Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing 100876);2(Department of Informatization and Industry Development, State Information Center, Beijing 100045);3(Network Security Research Center, Fudan University, Shanghai 200433)
  • Online:2018-12-01

Abstract: E-government is evolving along with the development of national informatization. The e-government network security has become an important research field of national information security. However, the traditional LAN or Internet model cannot meet the need of e-government network based on region and domain management in China. The IATF(information assurance technical framework)theory originating from the US National Security Agency has become a reference for the design of network security architectures in many countries. However, the IATF model still cannot be well applied to the features and security management requirements of e-government network of China. At present, China’s e-government network has its own features characterized with the hierarchical domain protection architecture, classified controlled access requirements and graded responsibility management approach. Based on the in-depth analysis of e-government network status and requirements, a trust interconnection control (TIC) model for e-government network security is proposed to improve the trust control system. In the TIC model, three architecture designs of e-government network security are introduced, including the peer interconnectionmodel, hierarchical interconnection model and hybrid interconnection model, and the key technologies are designed in detail, such as cross-domain trusted transfer, inter-domain security supervision and whole-process strategy control etc. Finally, the TIC model is evaluated by analytic hierarchy process (AHP) method. The evaluation results show that in the complex e-government network, the TIC model can be suitable for the architecture design of the e-government network security. The key technologies in TIC can provide a valuable reference for the construction of the security system of the e-government networks and the implementation of the relevant products.

Key words: e-government, trust interconnection control, cross-domain trusted transfer, inter-domain security supervision, whole-process strategy control

CLC Number: