• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Zhonglin, Shan Zhiguang, Xiao Guoyu, Chen Shanzhi. The Trust Interconnection Control Model of E-Government Network Construction[J]. Journal of Computer Research and Development, 2018, 55(12): 2637-2650. DOI: 10.7544/issn1000-1239.2018.20170773
Citation: Chen Zhonglin, Shan Zhiguang, Xiao Guoyu, Chen Shanzhi. The Trust Interconnection Control Model of E-Government Network Construction[J]. Journal of Computer Research and Development, 2018, 55(12): 2637-2650. DOI: 10.7544/issn1000-1239.2018.20170773

The Trust Interconnection Control Model of E-Government Network Construction

More Information
  • Published Date: November 30, 2018
  • E-government is evolving along with the development of national informatization. The e-government network security has become an important research field of national information security. However, the traditional LAN or Internet model cannot meet the need of e-government network based on region and domain management in China. The IATF(information assurance technical framework)theory originating from the US National Security Agency has become a reference for the design of network security architectures in many countries. However, the IATF model still cannot be well applied to the features and security management requirements of e-government network of China. At present, China’s e-government network has its own features characterized with the hierarchical domain protection architecture, classified controlled access requirements and graded responsibility management approach. Based on the in-depth analysis of e-government network status and requirements, a trust interconnection control (TIC) model for e-government network security is proposed to improve the trust control system. In the TIC model, three architecture designs of e-government network security are introduced, including the peer interconnectionmodel, hierarchical interconnection model and hybrid interconnection model, and the key technologies are designed in detail, such as cross-domain trusted transfer, inter-domain security supervision and whole-process strategy control etc. Finally, the TIC model is evaluated by analytic hierarchy process (AHP) method. The evaluation results show that in the complex e-government network, the TIC model can be suitable for the architecture design of the e-government network security. The key technologies in TIC can provide a valuable reference for the construction of the security system of the e-government networks and the implementation of the relevant products.
  • Related Articles

    [1]Xia Nu, Li Wei, Lu You, Jiang Jian, Shan Feng, Luo Junzhou. A Trust Model for the Inter-Domain Routing System[J]. Journal of Computer Research and Development, 2016, 53(4): 845-860. DOI: 10.7544/issn1000-1239.2016.20151121
    [2]Wu Yinghong, Huang Hao, Zeng Qingkai. Description of Service Oriented Access Control Policy Refinement[J]. Journal of Computer Research and Development, 2014, 51(11): 2470-2482. DOI: 10.7544/issn1000-1239.2014.20130973
    [3]Wang En, Yang Yongjian, Li Li. Game of Life Based Congestion Control Strategy in Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2014, 51(11): 2393-2407. DOI: 10.7544/issn1000-1239.2014.20130736
    [4]Liu Wu, Duan Haixin, Zhang Hong, Ren Ping, Wu Jianping. TRBAC: Trust Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1414-1420.
    [5]Tang Zhuo, Zhao Lin, Li Kenli, Li Ruixuan. A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk[J]. Journal of Computer Research and Development, 2009, 46(6): 948-955.
    [6]Nie Xiaowei, Feng Dengguo. TXACML—An Access Control Policy Framework Based on Trusted Platform[J]. Journal of Computer Research and Development, 2008, 45(10): 1676-1686.
    [7]Chen Ying, Yang Shoubao, Guo Leitao, and Shen Kai. A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment[J]. Journal of Computer Research and Development, 2006, 43(11): 1863-1869.
    [8]Zhu Yihua, Yu Li. A Dynamic Forwarding Pointer Mobility Management Strategy with a Fuzzy Logic Controller[J]. Journal of Computer Research and Development, 2005, 42(12): 2048-2055.
    [9]Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng. Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment[J]. Journal of Computer Research and Development, 2005, 42(9): 1558-1563.
    [10]Hu Lingyun and Sun Zengqi. Survey on Gait Control Strategies for Biped Robot[J]. Journal of Computer Research and Development, 2005, 42(5): 728-733.
  • Cited by

    Periodical cited type(6)

    1. 童伟传,方友军,唐明. 基于数据挖掘的政务数据安全风险检测系统. 信息技术. 2023(02): 151-156 .
    2. 白荣华,魏强,郭瑞,刘金. 政务信息系统商用密码集约化平台设计与实现. 信息安全研究. 2023(05): 461-468 .
    3. 黎祥远. 攻防视角下的高校网络安全防护策略——基于网络安全攻防演练的研究. 华商论丛. 2023(01): 101-106 .
    4. 朱然,曾宇. 基于信任评估模型的物联网节点篡改共识仿真. 计算机仿真. 2021(04): 267-271 .
    5. 刘平. 国家公共文化云网络安全设计和实践. 百花. 2020(07): 31-34 .
    6. 张锐昕,王玉荣. 中国政府上网20年:发展历程、成就及反思. 福建师范大学学报(哲学社会科学版). 2019(05): 43-50+168 .

    Other cited types(2)

Catalog

    Article views (956) PDF downloads (394) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return