• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang. UML-Based Modeling Method of Network Security Infrastructure[J]. Journal of Computer Research and Development, 2014, 51(7): 1578-1593.
Citation: Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang. UML-Based Modeling Method of Network Security Infrastructure[J]. Journal of Computer Research and Development, 2014, 51(7): 1578-1593.

UML-Based Modeling Method of Network Security Infrastructure

More Information
  • Published Date: July 14, 2014
  • Under the guidance of existing laws, regulations and standards, a general framework of network security infrastructure is proposed. The proposed infrastructure discusseds the relations between security objectives, security boundary, security infrastructure elements and security risk assessment. Based on this infrastructure, we present our modeling approaches of security objectives, security boundary and security infrastructure elements using UML’s standard and powerful modeling ability. Our modeling methods can eliminate the ambiguity in communication and make the representation of security system be standardized. Using our analysis methods, security administrators can validate how the business processes meet to the business goals and get the security risk of the system. By modeling an online banking, the proposed security framework and modeling methods’ validity and rationality are verified. The proposed approach can help security administrators model the network security system in a visualization method. Based on modal logic, security administrators can deduce the logical relationships between each element and the results can guide security administrators to deploy proper security measures. Compared with the existing methods, the method of this paper is more comprehensive and has stronger guiding significance.
  • Related Articles

    [1]Xu Kai, Wu Xiaojun, Yin Hefeng. Distributed Low Rank Representation-Based Subspace Clustering Algorithm[J]. Journal of Computer Research and Development, 2016, 53(7): 1605-1611. DOI: 10.7544/issn1000-1239.2016.20148362
    [2]Tang Chenghua, Liu Pengcheng, Tang Shensheng, Xie Yi. Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection[J]. Journal of Computer Research and Development, 2015, 52(3): 718-728. DOI: 10.7544/issn1000-1239.2015.20130601
    [3]Yang Xinxin, Huang Shaobin. A Hierarchical Co-Clustering Algorithm for High-Order Heterogeneous Data[J]. Journal of Computer Research and Development, 2015, 52(1): 200-210. DOI: 10.7544/issn1000-1239.2015.20130493
    [4]Li Suke and Jiang Yanbing. Semi-Supervised Sentiment Classification Based on Sentiment Feature Clustering[J]. Journal of Computer Research and Development, 2013, 50(12): 2570-2577.
    [5]Lu Weiming, Du Chenyang, Wei Baogang, Shen Chunhui, and Ye Zhenchao. Distributed Affinity Propagation Clustering Based on MapReduce[J]. Journal of Computer Research and Development, 2012, 49(8): 1762-1772.
    [6]Ling Ping, Wang Zhe, Zhou Chunguang, Huang Lan. Reduced Support Vector Clustering[J]. Journal of Computer Research and Development, 2010, 47(8): 1372-1381.
    [7]Zhang Gang, Liu Yue, Guo Jiafeng, and Cheng Xueqi. A Hierarchical Search Result Clustering Method[J]. Journal of Computer Research and Development, 2008, 45(3): 542-547.
    [8]Ding Shifei, Shi Zhongzhi, Jin Fengxiang, Xia Shixiong. A Direct Clustering Algorithm Based on Generalized Information Distance[J]. Journal of Computer Research and Development, 2007, 44(4): 674-679.
    [9]Ni Weiwei, Lu Jieping, and Sun Zhihui. An Effective Distributed k-Means Clustering Algorithm Based on the Pretreatment of Vectors' Inner-Product[J]. Journal of Computer Research and Development, 2005, 42(9): 1493-1497.
    [10]Liu Tao, Wu Gongyi, Chen Zheng. An Effective Unsupervised Feature Selection Method for Text Clustering[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1095) PDF downloads (792) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return