{"title":"Design of network action surveillance system based on internet real-name system","authors":"Libo Hou","doi":"10.1109/ICSPS.2010.5555274","DOIUrl":null,"url":null,"abstract":"This paper presents a framework for internet realname system development that introduces a new phase in the usual procedure: Active Real-name System and Automatic Security Surveillance. The main goal of this paper is to bridge the gap between the real-name requirement analysis and the internet crime implementation through the generation of a model of the security system architecture plus the security policies associated with the components of the model that have to enforce them. For this purpose, the design phase is composed of two complementary steps: an architectural model and a set of design-level security policies. The main advantages and desired characteristics of these models are analyzed; they are related to existing work in the area; and future research directions are pointed.","PeriodicalId":234084,"journal":{"name":"2010 2nd International Conference on Signal Processing Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Conference on Signal Processing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPS.2010.5555274","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a framework for internet realname system development that introduces a new phase in the usual procedure: Active Real-name System and Automatic Security Surveillance. The main goal of this paper is to bridge the gap between the real-name requirement analysis and the internet crime implementation through the generation of a model of the security system architecture plus the security policies associated with the components of the model that have to enforce them. For this purpose, the design phase is composed of two complementary steps: an architectural model and a set of design-level security policies. The main advantages and desired characteristics of these models are analyzed; they are related to existing work in the area; and future research directions are pointed.