数据存储安全评估的形式化模型

T. Bilski
{"title":"数据存储安全评估的形式化模型","authors":"T. Bilski","doi":"10.1109/ICCSA.2007.17","DOIUrl":null,"url":null,"abstract":"Backup systems use LAN or WAN. The networks and remote systems are not managed by data owner. It is necessary to integrate network storage systems with security mechanisms. There are many solutions to the backup confidentiality problem. In a given application one has to select the solution according to many factors such as: security level, performance, key management issues and overall cost. The optimization problem may be solved with a use of simulation tools. Diverse, general and specific models have been proposed. Most of them deal only with parts of the problem. The model presented in the paper is more general. It deals simultaneously with all 3 security attributes. It deals with data lifecycle and utilizes storage and transmission convergence.","PeriodicalId":386960,"journal":{"name":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Formal Model for Data Storage Security Evaluation\",\"authors\":\"T. Bilski\",\"doi\":\"10.1109/ICCSA.2007.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Backup systems use LAN or WAN. The networks and remote systems are not managed by data owner. It is necessary to integrate network storage systems with security mechanisms. There are many solutions to the backup confidentiality problem. In a given application one has to select the solution according to many factors such as: security level, performance, key management issues and overall cost. The optimization problem may be solved with a use of simulation tools. Diverse, general and specific models have been proposed. Most of them deal only with parts of the problem. The model presented in the paper is more general. It deals simultaneously with all 3 security attributes. It deals with data lifecycle and utilizes storage and transmission convergence.\",\"PeriodicalId\":386960,\"journal\":{\"name\":\"2007 International Conference on Computational Science and its Applications (ICCSA 2007)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-08-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Computational Science and its Applications (ICCSA 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSA.2007.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Science and its Applications (ICCSA 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSA.2007.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

备份系统使用局域网或广域网。网络和远程系统不是由数据所有者管理的。将网络存储系统与安全机制集成是必要的。备份机密性问题有许多解决方案。在给定的应用程序中,必须根据许多因素选择解决方案,例如:安全级别、性能、密钥管理问题和总体成本。利用仿真工具可以解决优化问题。人们提出了不同的、一般的和特定的模型。他们中的大多数只处理问题的一部分。本文提出的模型具有较强的通用性。它同时处理所有3个安全属性。它处理数据生命周期,利用存储和传输的融合。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Formal Model for Data Storage Security Evaluation
Backup systems use LAN or WAN. The networks and remote systems are not managed by data owner. It is necessary to integrate network storage systems with security mechanisms. There are many solutions to the backup confidentiality problem. In a given application one has to select the solution according to many factors such as: security level, performance, key management issues and overall cost. The optimization problem may be solved with a use of simulation tools. Diverse, general and specific models have been proposed. Most of them deal only with parts of the problem. The model presented in the paper is more general. It deals simultaneously with all 3 security attributes. It deals with data lifecycle and utilizes storage and transmission convergence.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信