Loading...

Table of Content

    03 April 2020, Volume 6 Issue 4
    Research and Application of Remote Mobile Office Security Standard
    2020, 6(4):  282-288. 
    Asbtract ( )   PDF (2840KB) ( )  
    References | Related Articles | Metrics
    In recent years, with the rapid development of 5G and other mobile communication technologies, the communication and collaborative office based on smart phones has attracted more and more attention and favor. Mobile office is the inevitable trend of information development and an important means to support business model innovation. Under the guidance of national policies, various industries and localities have actively carried out the construction of mobile office system, and achieved certain results, but the depth and breadth of application still need to be improved. Security is always the primary consideration in the application and promotion of mobile office technology. Mobile office security involves many aspects, such as intelligent terminal security, application security, data security, communication security, system security and so on, which needs to be regulated and guided by relevant standards. This paper analyzes the current research situation of national standards, introduces the technical framework of egovernment mobile office standards, and gives relevant practical cases. It is hoped that this paper will play a certain role in promoting the research and application of mobile office standards.
    Research and Implementation of Security Model of Telecommuting System Based on Zero Trust
    2020, 6(4):  289-295. 
    Asbtract ( )   PDF (2116KB) ( )  
    References | Related Articles | Metrics
    Telecommuting has become very popular and been widely accepted because of its various advantages. However, it brings numbers of serious problems related to network security. With the continuous emergence of new technologies, the gradual evolution of the network environment, the popularity of BYOD and the ever-increasing network security incidents, the security risks faced by telecommuting have greatly increased. Since the traditional network boundary defense model can no longer meet the needs of network security today, the Zero Trust Network is being recognized as a new security model by more and more people. The term zero trust was first used by a Forrester's expert when describing a new security model in which networks were no longer split into trusted and untrusted zones. ZTA is not a single network architecture, it is a methodology. Based on the understanding of the Zero Trust Network model, this paper compares it with the traditional perimeter model using an analysis of a real case, aiming to find a systematic approach to guide enterprises to solve telecommuting security problems. Addressing to provide some references for the companies preparing to implement this strategy.
    Research on Security Scheme of Telecommuting based on XDR + Zero trust architecture
    2020, 6(4):  296-300. 
    Asbtract ( )   PDF (1664KB) ( )  
    References | Related Articles | Metrics
    In recent years, with the rapid development of enterprise business, using information technology to promote business has become the consensus of all walks of life. Telecommuting, such as instant communication, online document editing, voice and video conferencing, has also become an essential working mode for enterprises. Telecommuting can bring convenience to work, but at the same time, it also brings huge network security risks. This paper mainly describes the security risks of the remote office environment and the solutions. For the reference of relevant readers.
    Remote Office Solution and Its Application Based on Secure Instant Messaging Technology
    2020, 6(4):  301-310. 
    Asbtract ( )   PDF (3086KB) ( )  
    References | Related Articles | Metrics
    Remote office is getting more and more favored by users for its characteristics of unconstrained time and space, high-efficiency and convenience, fragmentation time utilization and so on, but it also raised a lot of security problems. This article systematically introduces a security solution for remote office and its innovative applications. Based on the secure instant messaging architecture of interconnection and interworking, it realizes vertical security support and application aggregation, as well as horizontal data sharing and application collaboration through open aggregation interfaces. Therefore an remote office ecosystem is built. The solution has been widely used in sectors such as government, military, finance and energy, providing a security application solution to meet the requirements of relevant national standards for the high-security users’ remote office.
    Data Security Protection in Telecommuting
    2020, 6(4):  311-316. 
    Asbtract ( )   PDF (1032KB) ( )  
    References | Related Articles | Metrics
    Although the novel coronavirus pneumonia has been spread widely, with the effort of whole nation,the epidemic has been restrained to a certain extent. In order to keep our achievements, many enterprises take remote office as first choice. In this new situation, how to keep the important data of the enterprise safely and what safety measures should be taken are the primary problems for these enterprises. This article analysis data security risks in remote office scenarios firstly, and give a detail explain of data security threats in terminals, networks and business systems at the same time. Then, it introduces the conventional security measures involved in these threats. Finally, it focuses on several data security measures that need to be strengthened to ensure the basic security of remote office data.
    Identity Authentication Method Based on Blockchain Technology in Telecommuting
    2020, 6(4):  317-326. 
    Asbtract ( )   PDF (2267KB) ( )  
    References | Related Articles | Metrics
    Aiming at the problem of identity authentication in cyberspace, an identity authentication method based on blockchain technology is proposed. First of all, this paper reviews a series of problems related to integrity and security, such as the digital identity in information system is easy to be stolen or used falsely, the repudiation behavior in business transactions, the network identity concealment is not traceable, and the centralized system information is easy to be tampered with, and summarizes the shortcomings of traditional information technology in identity authentication. Then, combined with the advantages of blockchain technology, a digital identity generation and verification method based on blockchain technology is proposed. Then it analyzes some advantages of identity authentication method based on blockchain technology, and briefly introduces some related applications and practices. Finally, the essence and extension of identity authentication in cyberspace are discussed.
    Research on the Framework of High Security Mobile Office System Based on Wide Board Mobile Communication
    2020, 6(4):  327-337. 
    Asbtract ( )   PDF (4502KB) ( )  
    References | Related Articles | Metrics
    With the rapid development of mobile communication technology, mobile office solutions are becoming more and more popular. Mobile office system makes work easier and more effective, the overall operation is more coordinated, but there are many risks in the mobile terminal, network transmission and access, cloud service of the system. Firstly, this paper analyzes the security situation of mobile office and the inadequacies of mainline solutions, studies the security threats it faces, according to the latest technology achievements in the field of security and encryption, for the mobile office system in the field of high security, using the " terminal-net-cloud" architecture, based on the technology of cryptography , the security concept of defense in depth and terminal-net collaboration, the overall security and encryption solution is proposed to achieve the whole process, whole network and whole service security.
    Research and Implementation of Data Exchange Scheme Between Different Security Level Networks
    2020, 6(4):  338-344. 
    Asbtract ( )   PDF (2507KB) ( )  
    References | Related Articles | Metrics
    In the era of rapid development of information technology, the network represented by the Internet has penetrated into all walks of life. While enjoying the convenience brought by the Internet, the security risks such as hackers' invasion, malicious code attack and virus infection threaten the security of various connected networks at all times. At present, the mainstream security protection products in the security market, such as firewall, anti-virus and access Intrusion detection is basically based on the feature base or intelligence base accumulated by the prophet's experience to match and respond to known security threats. In the face of the rapid development of "black production" and the constantly upgrading of network malicious attacks, these traditional defense methods can not ensure the network security in time and effectively. With the emergence and development of network security isolation and data security exchange technology, through the deployment and implementation of the one-way ferry system based on the network gate, optical gate, CD-ROM recording ferry and data, a scientific and compliant connection way is established between different security level networks, and the data security exchange is completed according to the application scene, which effectively solves the connection between different security level networks Data security exchange.
    An Efficient Communication Framework in Multi-Agent Cooperating Learning Environment Zhao Yuhang and Ma Xiujun
    2020, 6(4):  345-349. 
    Asbtract ( )   PDF (1258KB) ( )  
    References | Related Articles | Metrics
    Reinforcement learning in cooperate multi-agent scenarios is important for real-world applications. While several attempts before tried to resolve it without explicit communication, we present a communication-filtering actor-critic algorithm that trains decentralized policies which could exchange filtered information in multi-agent settings, using centrally computed critics. Communication could potentially be an effective way for multi-agent cooperation. We supposed that, when in execution phase without central critics, high-quality communication between agents could help agents have better performance in cooperative situations. However, information sharing among all agents or in predefined communication architectures that existing methods adopt can be problematic. Therefore, we use a neural network to filter information between agents. Empirically, we show the strength of our model in two general cooperative settings and vehicle lane changing scenarios. Our approach outperforms several state-of-the-art models solving multi-agent problems.
    Requirements and supporting technologies of new remote mobile office scenarios in the 5G era
    2020, 6(4):  350-353. 
    Asbtract ( )   PDF (596KB) ( )  
    References | Related Articles | Metrics
    The ubiquitous network coverage fulfills the demands of mobile devices to access network anytime, anywhere. It also promotes the development of mobile office scenario. Remote mobile office is adopted by an increasing number of enterprises because of its convenience and flexibility. The upgrade of network technology, especially the upcoming fifth generation mobile network (5G), provides ultra-low latency, high-bandwidth, ultra- reliability network support for the Internet of things,and leads remote mobile office into a new era. This paper firstly introduces the changes in mobile office scenario under the background of the 5G era, and then emphasizes the requirements for 5G networks in remote mobile office scenario and makes suggestions on the development of related supporting technologies.
    Optimization Design and Implementation of Application Layer Interface of Trusted Cryptography Module
    2020, 6(4):  354-361. 
    Asbtract ( )   PDF (1455KB) ( )  
    References | Related Articles | Metrics
    Trusted computing technology is an important technical to ensure information security which implementation depends on trusted chip. The trusted cryptography module (TCM) is a kind of trusted chip that conforms to Chinese standards. Currently, the TCM application interface defined in functionality and interface specification of cryptographic support platform for trusted computing has some problems, such as the use process is complex and low ease of use, which hinders the application of trusted computing technology. To solve these problems, a set of optimized TCM application layer interface is proposed, which is divided into four modules according to functions, namely cryptography algorithm service module, TCM resource service module, identity authentication service module and platform protection service module. In addition, an optimized method about context resources management and TCM resources recovery is proposed, which can effectively improve the usability of the interface and enhance the recovery capability of TCM resources. Experimental results show that the optimized interface increases the time cost by less than 10% compared with the interface in the specification, but it can significantly reduce the number of lines of core code.
    A cloud computing cybersecurity method based on security domain
    2020, 6(4):  362-366. 
    Asbtract ( )   PDF (1480KB) ( )  
    References | Related Articles | Metrics
    Security domain is a kind of effective method to improve the cloud computing cybersecurity. using network segmentation,cloud computing is divided into different security domains ,each security domain has the same characteristics and the unification of the resources of the protective security requirements,appropriate protective measures are deployed in the boundary of each security domain, so as to achieve the purpose of defense in depth.This paper analyzes the level of network security, gives the steps and elements of cloud computing security domain, and provides a typical security domain and control practice of cloud computing.
    Virtual Machine Introspection Technology Based on System-Call Interception
    2020, 6(4):  367-372. 
    Asbtract ( )   PDF (1173KB) ( )  
    References | Related Articles | Metrics
    Virtual machine introspection technology is a kind of technology that monitors the operating system and the operating status of the virtual machine from outside the virtual machine. The technology is less expensive and more secure because it does not require agents to be installed inside the virtual machine. In this paper, a virtual machine introspection technology based on system call interception is proposed, which intercepts the system calls that occur within the virtual machine by adjusting the response mechanism of VMM to system calls, and by analyzing system calls, the purpose of monitoring abnormal behavior state within the virtual machine is achieved.
    Research on Internet of Things Security Based on Cloud Computing
    2020, 6(4):  373-376. 
    Asbtract ( )   PDF (701KB) ( )  
    References | Related Articles | Metrics
    In order to improve people's quality of life, cloud computing and the Internet of things gradually play an important role in health care, education and agriculture, as well as many cross fields. Cloud computing's ability to transmit, store, process and access massive production data just makes up for the shortcomings of the Internet of things, and can better serve the future intelligent life. This paper discusses the challenges brought by the application scenarios of the Internet of things in cloud computing and the security issues of the three-level system, and puts forward the specific countermeasures related to the three-level security threats.