{"title":"数据存储安全评估的形式化模型","authors":"T. Bilski","doi":"10.1109/ICCSA.2007.17","DOIUrl":null,"url":null,"abstract":"Backup systems use LAN or WAN. The networks and remote systems are not managed by data owner. It is necessary to integrate network storage systems with security mechanisms. There are many solutions to the backup confidentiality problem. In a given application one has to select the solution according to many factors such as: security level, performance, key management issues and overall cost. The optimization problem may be solved with a use of simulation tools. Diverse, general and specific models have been proposed. Most of them deal only with parts of the problem. The model presented in the paper is more general. It deals simultaneously with all 3 security attributes. It deals with data lifecycle and utilizes storage and transmission convergence.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Formal Model for Data Storage Security Evaluation\",\"authors\":\"T. Bilski\",\"doi\":\"10.1109/ICCSA.2007.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Backup systems use LAN or WAN. The networks and remote systems are not managed by data owner. It is necessary to integrate network storage systems with security mechanisms. There are many solutions to the backup confidentiality problem. In a given application one has to select the solution according to many factors such as: security level, performance, key management issues and overall cost. The optimization problem may be solved with a use of simulation tools. Diverse, general and specific models have been proposed. Most of them deal only with parts of the problem. The model presented in the paper is more general. It deals simultaneously with all 3 security attributes. It deals with data lifecycle and utilizes storage and transmission convergence.\",\"PeriodicalId\":386960,\"journal\":{\"name\":\"2007 International Conference on Computational Science and its Applications (ICCSA 2007)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-08-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Computational Science and its Applications (ICCSA 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSA.2007.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSA.2007.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Formal Model for Data Storage Security Evaluation
Backup systems use LAN or WAN. The networks and remote systems are not managed by data owner. It is necessary to integrate network storage systems with security mechanisms. There are many solutions to the backup confidentiality problem. In a given application one has to select the solution according to many factors such as: security level, performance, key management issues and overall cost. The optimization problem may be solved with a use of simulation tools. Diverse, general and specific models have been proposed. Most of them deal only with parts of the problem. The model presented in the paper is more general. It deals simultaneously with all 3 security attributes. It deals with data lifecycle and utilizes storage and transmission convergence.