用户名: 密码: 验证码:
网络化协同工作系统安全体系结构及信息传输安全
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着市场竞争的日趋激烈,企业只有寻求技术革新提高市场竞争力才能立足全球市场。Web技术的发展为企业实现技术革新提供了契机,这就是开发网络化协同工作系统实现动态联盟和企业间协作,从而提高市场竞争力。信息安全技术是开发网络化协同工作系统的使能技术,而信息传输安全又是信息安全的重要组成部分,本文对网络化协同工作系统的信息传输安全进行了研究。
     为了实现网络化协同工作系统的信息传输安全,本文对网络化协同工作系统体系结构及其信息安全体系结构进行了阐述,在此基础上进行了信息传输安全的相关技术研究,包括密码学、密钥管理和安全协议的研究。根据本文研究的体系结构和理论成果,最后本文对信息传输安全的实现技术进行了阐述并给出了实现实例。
In order to win the global market, manufacturing organisations must search for new approches to shorten the time to market and enhance the qulity of their products. The great progress of web technology in the past few years has brought manufacturing organisations new chances to realize it. Some new techonology based on web has been proposed, including web-based cooperative work system (WCWS). WCWS is the product of integration of web and cooperative work system and because of its attractive features it is studied by many researchers now. Information security is one enabling technology of WCWS and communication security is an important part of information security.
    In order to realize the communication security in WCWS, some techonologies related to communication security in WCWS, including cryptology, key management and security protocol, are studied in this paper. In order to illustrate the relationship among the WCWS scheme, the information security scheme and these techonologies, architecture of WCWS is proposed firstly and then architecture of information security of WCWS is presented. Finally, the techonology to implement information transmission security is described and an instance is given out.
引文
[1] 徐晓飞,战德臣,叶丹等.动态联盟组织方法体系,计算机集成制造系统,1999,5(1):7-12
    [2] A.Gunasekaran, Implementation of computer integrated manufacturing: a survey of integration and adaptability issues, International Journal of Computer Integrated Manufacturing. 1997, 10(1): 266-280
    [3] Germano Carommi, Sandeep Kumar, Christoph Schuba. Virtual Enterprise Networks: The next Generation of Secure Enterprise Networking. Fourteenth Annual Computer Security Applications Conference, Radisson Resort Scottsdale, Phonenix, Arizona. December 1998,
    [4] Roger Nagal, Rick Dove, 21st Century Manufacturing Enterprise Strategy, An Industry-Led View,Iacocca Institute, Lehigh University, 1991
    [5] 汪劲松,段广洪,李方义等,基于产品生命周期的绿色制造技术研究现状与展望,计算机集成制造系统,1999,5(4):1-8
    [6] Joseph Pine, B. Mass-customization: the New frontier in business competition, Harvard Business School Press, Boston, 1993
    [7] 张曙,美国的“下一代制造”和我们的对策.中国机械工程.2000, 11(1—2):97-100
    [8] National Research Council, Committee on Visionary Manufacturing Challenges. Visionary Manufacturing Challenges for 2020. National Academy Press. 1999
    [9] Davidow WH. Malone MS. The virtual corporation. USA: Harper Collins Publishers. 1992.
    [10] D.Su and N Amin, A CGl-based approach for remotely executing a large program for integration of design and manufacture over the Internet. International Journal of Computer Integrated Manufacturing.2001,14(1): 55-65.
    [11] Dr. Richard, B.Neely, Security Architecture Development and Results for a Distributed Modeling and Simulation System, Fourteenth Annual Computer Security Applications Conference, Radisson Resort Scottsdale, Phonenix, Arizona, December 1998
    [12] U.S. Department of defense, "Trusted Computer System Evaluation Criteria", Standard 5200.28-STD,December. 1985.
    [13] 蒋韬,李信满,刘积仁.信息安全模型研究,小型微型计算机系统.2000,21(10):1078-1081
    [14] 冯登国,卿思汉编著.信息安全—核心理论与实践,国防工业出版社.北京.2000,6.
    [15] 杨义先等编著.网络信息安全与保密,北京邮电大学出版社.北京,1999,11.
    [16] Cutkosky, M.R., Tenenbaum, J.M., and Glicksman, J., MADEFAST: collaborative engineering over the Intemet. Communications of the ACM, 1996, 39(9): 78-87
    [17] G.Q.Huang, K.L.Mak. Web-integrated manufacturing: recent developments and emerging issues.International Journal of Computer Integrated Manufacturing. 2001, 14(1): 3-13.
    [18] Muller, P.C., De Poorter, et al, Using the Internet as a communication infrastructure for lead user involvement in the new product development process. Proceedings of WET ICE'96, 1996: 220-225.
    [19] Kalyanapasupathy, V., Lin, et al, Group technology code generation over the Internet. http://www, isr. umd.edu/Labs/CIM./profiles/lin/docs.gt/1997.
    [20] Charles S. Smith, CyberCut: A World Wide Web Based Design to Fabrication Tool, Journal of Manufac-turing Systems, 1996, 15(6): 432-442
    
    
    [21] Urich Gall, Franz J. Hauck, Promondia: A Java-Based Framework for Real-Time Group Communication In the Web, http://www4, informatik, uni-erlangen.de/promondia/
    [22] W. Appelt, U. Busbach. "The BSCW system: a WWW based application to support cooperation of distributed groups." 1996. http://orgwis.gmd.de/~busbach/wetice.ps
    [23] Leslie Monplaisir. An integrated CSCW architecture for integrated product/process design and development, Robotics and Computer-Integrated Manufacturing. 15,(1999): 145-153;
    [24] Tim. Kindberg. Mushroom: a framework for collaboration and interaction across the Internet. In: Proc. of the ERCIM Workshop on CSCW and the Web, St. Augustin, Germany, Feb7-9,1996.
    [25] 刘锦兴,秦叶,李荣彬等,基于信息网络的异地协同设计与制造系统研究,中国机械工程,1999,10(8):882-885
    [26] 哈进兵,张友良,李舟洲.异地企业协同工作的Web模型及实现,计算机集成制造系统,2001,7(5):37-41
    [27] P.A. Bernstein, Middleware: a model for distributed system services, Communications of the ACM,1996, 39(2): 86-98.
    [28] Martin Hanneghan, Madjid Merabti, Gary Colquhoun, A viewpoint analysis reference model for Concurrent Engineering, Computers in Industry. 1996, 41(1): 35-47
    [29] Bentley, R. Horstmann, T, Trevor, J, The World Wide Web as enabling technology for CSCW: The case of BSCW. The Journal of Collaborative Computing, 2-3, 1997.
    [30] Bentley, R. Appelt, W. Designing a system for cooperative work on the World Wide Web: Experiences with the BSCW system, in Proceedings of 30(th) Hawaii International Conference on System Sciences,January 1997
    [31] Nikola B. Serbedzija. Web Computing Framework, Journal of System Architecture, 45, 1999:1293-1306;
    [32] G.Q.Huang, K.L.Mak. Issues in the development and implementation of Web applications for product design and manufacture. International Journal of Computer Integrated Manufacturing. 2001, 14(1):125-135.
    [33] G.Q.Huang, S.W. Lee, K.L.Mak, Web-based product and process data modeling in concurrent 'design for X', Robotics and Computer-Integrated Manufacturing 15(1999): 53-63
    [34] P.A.Rodgers, N.H.M.Caldwell, The management of concept design knowledge in modern product development organizations. International Journal of Computer Integrated Manufacturing. 2001, 14(1).108-115.
    [35] Schubert Foo, Siu Cheung Hui, Peng Chor Leong, Shigong Liu. An Integrated help desk support for customer services over the World Wide Web-a case study, Computers in Industry. 1997, 14(2): 129-145
    [36] S.M.Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communications. Reviews,May 1989
    [37] A. Lin, R.Brown, Security policy conceptual modeling and formalization for networked information system, computer communications, 2000, 23(17): 1716-1723
    
    
    [38] L.M.Camarinha-matos, H.Afsarmanesh and A.L.Osorio. Flexibility and safety in a web-based infrastructure for virtual enterprises. International Journal of Computer Integrated Manufacturing. 2001, 14(1): 66-82.
    [39] G.Cena, A.Vzlenzano, S.Vitturi, Integrating filedbuses and factory intranets. International Journal of Computer Integrated Manufacturing. 2001, 14(1): 41-54
    [40] D.R.Stinson, Cryptography, Theory and Practice. Florida, CRC Industry. Press, 1995
    [41] Shivraj Kanungo, Identity Authentication in Heterogeneous Computing Environments: A Comparative Study for an Integrated Framework, Computer Security, 1994,13(3): 231-253
    [42] 莫瑞.加瑟著.计算机安全的技术和方法.[M]北京,电子工业出版社
    [43] Bell D E, PaLadula L J. Secure computer system: mathematical foundations, MTR-2547, Vol.2,Bedford, MA:MITRE Corp. 1973
    [44] Millen, J.K, Models of multilevel computer security. Advances in Computers, Vol.22, Academic Press Inc. 1989
    [45] D.E.Denning, A lattice mode of secure information flow. Communications Of ACM, 1976, 19(.5).236-243
    [46] P.K.Thomas and R.S.Sandhu. Task-based Authorization controls (TBAC): Models For Active and Enterprise-oriented Authorization Management. In Proceedings of the 11(th) IFIP WG 11.3 Conference on Database Security, Lake Tahoe, CA, August 1997.
    [47] G.Caronni, M.Waldvogeh D.Sun, B Plattner, Efficient security for large and dynamic groups,Technical Report TIK Technical Report No.41, Computer Engineering and Networks Laboratory, Swiss Federal Institute of Technology, February 1998
    [48] L.Gong, N.Shacham, Elements of trusted multicasting, in: Proceedings of the IEEE International Conference on Network Protocols, Boston, MA, USA, October 1994:23-30
    [49] I. Chang, R, Engel, D.Kandlur, Key management for secure internet multicast using Boolean function minimization techniques, in: IEEE INFOCOM, New York, March, 1999
    [50] S.Mittra, Iolus: A framework for scalable secure multieasting, in: Proceedings of the ACM SIGCOMM.Cannes, France, September, 1997:277-288
    [51] A.Ballardie, Scalable Muiticast Key Distribution, IETF RFC-1949, May1996
    [52] H.Harney, C.Muckehirn, Group Key Management Protocol(GKMP) Architecture. IETF RFC-2093,2094, July 1997
    [53] ANSI X9.69, Key Management Extensions, 1998
    [54] C.K.Wong, M.Gouda, S.S.Lam, Secure group communications using key graphs, in Proceedings of the ACM SIGCOMM, August. 1998
    [55] L.R. Dondeti, S.Mukherjee, Sealable secure one-to-many group communication using dual encryption,Computer Communications Vol.23.No.17.2000:1681-1701
    [56] 曹健,协同产品开发系统理论及支持技术研究[博],南京:南京理工大学,1999,12
    [57] Macgregor, R.S., Aresi, A., and Siegert, A., WWW Security, How to Build a Secure World Wide Web Connection, 1996, New York: IBM, Prentice Hall PTR.
    
    
    [58] 张焕国等,计算机安全保密技术,机械工业出版社,1995,2
    [59] Shannon, C.E. Communication Theory of Secrecy System. Bell Syst. Tech. J., Vol.28, 1949.
    [60] 刘启原,刘怡等,数据库与信息系统的安全,科学出版社.2000,1
    [61] 谢冬青编著,计算机安全保密技术,湖南大学出版社,1998,10
    [62] 裴定一,赵仁杰,周锦君编,密码学进展-CHINACRYPT'96,第四届中国密码学学术会议论文集,科学出版社,北京,1996,3
    [63] 龚俭,陆晟,王倩编,计算机网络安全导论,东南大学出版社,2000,8
    [64] M.Burrows, et.al., Logic of authentication, ACM Transactions on Computer Systems 8(1)1990:18-36
    [65] 卢开澄,郭宝安,戴一奇等,计算机系统安全,重庆出版社,1999,5
    [66] 李中献,詹榜华,杨义先.认证理论与技术的发展,电子学报.1999,27(1):98—102
    [67] S.Nidamarthi, R.H.Allen and R.D.Sriram. Observations from supplementing the traditional design process via internet-based collaborations. International Journal of Computer Integrated Manufacturing.2001,14(1): 95-107.
    [68] US Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD
    [69] US Department of Defense, National Computer Security Center, Glossary of Computer Security Terms,NCSC-TG-004-88, Ft. Meade, Md., National Computer Security Center, Oct.21, 1988
    [70] H.H.Hosmer, Applying fuzzy logic to the multipolicy paradigm, Computer Security Journal. 2000, 10(11): 34-45
    [71] R.Holbein. Secure Information Exchange in Organizations-An Approach for Solving the Information Misuse Problem. PhD thesis, University of Zurich, 1996
    [72] V. Atluri and W.-K.Huang. An Authorization Model for Workflows. In Proceedings of the 4(th) European Symposium on Research in Computer Security. Springer, 1996
    [73] E.Bertino, E.Ferrari, and V. Atluri. A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management System, In Proceedings of the 2(nd) ACM Workshop on Role-based Access Control, Fairfax, Virgina, 1997
    [74] D.E.R. Denning. Cryptography and Data Security. Addison-Wesley, 1983
    [75] N.H. Minsky and V. Ungureanu. Unified support for heterogeneous security policies in distributed systems.In 7th USENIX Security Symposium, January 1998.
    [76] 冯登国,密码分析学,清华大学出版社,北京,2000,8.
    [77] C.Blundo, A.De Santis, A.Herzberg, S.Kutten, U.Vaccaro, M Yung, Perfectly-Secure Key Distribution for Dynamic Conferences. Information and Computation, December 1997.
    [78] William Stallings[美]著,网络安全要素—应用与标准,人民邮电出版社,2000,11.
    [79] 卿斯汉,冯登国,信息和通信安全—CCICS'99第一届中国信息和通信安全学术会议论文集,科学出版社,2000,1:71-76
    [80] Atto Salomaa[芬兰]著,丁存生,单炜绢译,公钥密码学,国防工业出版社,北京,1998
    [81] ISO, Open systems interconnection reference model-part 2: Security architecture, ISO International Standard, 7498-2, 1988.
    
    
    [82] Hafedh Mili, Fatma Mill, Ali Mili. Reusing Software: Issuers and Research Directions. IEEE Trans. On SE,1995, 21(6): 528—561
    [83] Purtilo J M et al. Module Reuse by Interface Adaptation. Software Practice and Experience, 1991, 21(6): 539—556
    [84] Bruce Schneier,应用密码学.机械工业出版社.2001
    [85] 冯登国,分组密码的设计与分析.清华大学出版社.2000
    [86] 冯登国,密码学引导.科学出版社.1999
    [87] 潘爱民著,COM原理与应用.清华大学出版社.1999,11
    [88) 王敏毅,周明天,蒋遂平.基于Internet的分布式对象技术.计算机应用.1998,18(4):4—7
    [89] 陈文博,夏长虹,以组件对象为中心的动态Web开发方法.计算机应用.2000,20(6):17—19
    [90] 卢孟余,楚春波,张世永.Web对象模型及在多层结构Web开发中的应用.计算机工程.1999,25(12):36,37,64
    [91] 张骏,王俊峰,张世永.Web应用程序的设计与分析,计算机工程与应用.2000,36(3):116—121

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700