{"title":"基于网络实名制的网络行动监控系统设计","authors":"Libo Hou","doi":"10.1109/ICSPS.2010.5555274","DOIUrl":null,"url":null,"abstract":"This paper presents a framework for internet realname system development that introduces a new phase in the usual procedure: Active Real-name System and Automatic Security Surveillance. The main goal of this paper is to bridge the gap between the real-name requirement analysis and the internet crime implementation through the generation of a model of the security system architecture plus the security policies associated with the components of the model that have to enforce them. For this purpose, the design phase is composed of two complementary steps: an architectural model and a set of design-level security policies. The main advantages and desired characteristics of these models are analyzed; they are related to existing work in the area; and future research directions are pointed.","PeriodicalId":234084,"journal":{"name":"2010 2nd International Conference on Signal Processing Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of network action surveillance system based on internet real-name system\",\"authors\":\"Libo Hou\",\"doi\":\"10.1109/ICSPS.2010.5555274\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a framework for internet realname system development that introduces a new phase in the usual procedure: Active Real-name System and Automatic Security Surveillance. The main goal of this paper is to bridge the gap between the real-name requirement analysis and the internet crime implementation through the generation of a model of the security system architecture plus the security policies associated with the components of the model that have to enforce them. For this purpose, the design phase is composed of two complementary steps: an architectural model and a set of design-level security policies. The main advantages and desired characteristics of these models are analyzed; they are related to existing work in the area; and future research directions are pointed.\",\"PeriodicalId\":234084,\"journal\":{\"name\":\"2010 2nd International Conference on Signal Processing Systems\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 2nd International Conference on Signal Processing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSPS.2010.5555274\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Conference on Signal Processing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPS.2010.5555274","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design of network action surveillance system based on internet real-name system
This paper presents a framework for internet realname system development that introduces a new phase in the usual procedure: Active Real-name System and Automatic Security Surveillance. The main goal of this paper is to bridge the gap between the real-name requirement analysis and the internet crime implementation through the generation of a model of the security system architecture plus the security policies associated with the components of the model that have to enforce them. For this purpose, the design phase is composed of two complementary steps: an architectural model and a set of design-level security policies. The main advantages and desired characteristics of these models are analyzed; they are related to existing work in the area; and future research directions are pointed.