By studying the automatic verification analysis techniques of network security domain
a secure domain topology automatically restore and security domains devices interconnected relations
security domain boundaries and border access control policy automatic verification were achieved. Through automation
normalization and processes curing methods
violations of the security domain provisions of the act were detected. It ensures border access control policy is minimized and network security domain is divided continued compliance
reduces the risks associated with the security domain management.
关键词
Keywords
references
邱岚 , 谭彬 . 安全域划分研究与应用 . 计算机安全 , 2012 ( 6 )
Qiu L , Tan B . Research and application of security domain . Computer Security , 2012 ( 6 )
中国移动通信集团公司 . 中国移动支撑系统安全域划分与边界整合技术要求 , 2008
China Mobile Communications Corporation . Technical Specification of Secure Domain and Boundary Convergence for Supporting Systems , 2008
GB/T 25058-2010. 信息安全技术 信息系统安全等级保护实施指南 , 2010
GB/T 25058-2010.Information Security Technology-Implementation Guide for Classified Protection of Information System , 2010
李萍 , 于慧龙 . 大型信息系统安全域划分和等级保护 . 计算机安全 , 2006 ( 7 )
Li P , Yu H L . Large-scale information systems security domain partitioning and graded protection . Computer Security , 2006 ( 7 )