Advanced Search
    Chen Zhonglin, Shan Zhiguang, Xiao Guoyu, Chen Shanzhi. The Trust Interconnection Control Model of E-Government Network Construction[J]. Journal of Computer Research and Development, 2018, 55(12): 2637-2650. DOI: 10.7544/issn1000-1239.2018.20170773
    Citation: Chen Zhonglin, Shan Zhiguang, Xiao Guoyu, Chen Shanzhi. The Trust Interconnection Control Model of E-Government Network Construction[J]. Journal of Computer Research and Development, 2018, 55(12): 2637-2650. DOI: 10.7544/issn1000-1239.2018.20170773

    The Trust Interconnection Control Model of E-Government Network Construction

    • E-government is evolving along with the development of national informatization. The e-government network security has become an important research field of national information security. However, the traditional LAN or Internet model cannot meet the need of e-government network based on region and domain management in China. The IATF(information assurance technical framework)theory originating from the US National Security Agency has become a reference for the design of network security architectures in many countries. However, the IATF model still cannot be well applied to the features and security management requirements of e-government network of China. At present, China’s e-government network has its own features characterized with the hierarchical domain protection architecture, classified controlled access requirements and graded responsibility management approach. Based on the in-depth analysis of e-government network status and requirements, a trust interconnection control (TIC) model for e-government network security is proposed to improve the trust control system. In the TIC model, three architecture designs of e-government network security are introduced, including the peer interconnectionmodel, hierarchical interconnection model and hybrid interconnection model, and the key technologies are designed in detail, such as cross-domain trusted transfer, inter-domain security supervision and whole-process strategy control etc. Finally, the TIC model is evaluated by analytic hierarchy process (AHP) method. The evaluation results show that in the complex e-government network, the TIC model can be suitable for the architecture design of the e-government network security. The key technologies in TIC can provide a valuable reference for the construction of the security system of the e-government networks and the implementation of the relevant products.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return