Skip to main content

The Implementation with the Network Data Security on the Secure Desktop

  • Conference paper
Emerging Technologies for Information Systems, Computing, and Management

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 236))

  • 1060 Accesses

Abstract

Nowadays, the electronic power industry is improving the level of information, and the data security of the internal network is arousing more and more attention. The domestic units and enterprises implemented relatively comprehensively. Most of them deployed firewall, intrusion detection and vulnerability scanning systems which allow them to reduce the risk of network boundaries greatly. However, as to the network terminal management within the network of the enterprise, the current risk prevention measures are far from enough because the internal network security issues come out easily. Combined with the extensive practical application of the electric power enterprise, this paper puts forward the secure desktop idea so as to solve the terminal security of the internal network computers. This measure can achieve the aim of a further control of the terminal security of the internal network computers. Thereby, it realizes a better controlled data security within the internal network and provides a good security network solution of the protection with the electric power business.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, S., Liu, W., Yang, S.M.: Discuss about the green protection strategy of enterprise internal network. Electr. Power Inf. Technol. 3–8 (2008)

    Google Scholar 

  2. Pan, Z.Y., Pan, J.Y.: Analysis on internal network safety threat and prevention. Ordnance Ind. Autom. (2008)

    Google Scholar 

  3. Pan, Y.X.: The actuality and development trend of desktop security management technology. Inf. secur. Technol. (2010)

    Google Scholar 

  4. Hu, W., Zhang, C.H., Liao, W.: Security management function design of computer security defence system. Comput. Engine. Des. 5–30 (2010)

    Google Scholar 

  5. Liu, H.Y.: Research and design of security support model in the intranet. Mod. Electron. Tech. 3–20 (2007)

    Google Scholar 

  6. Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.V., Ramunno, G., Sadeghi, A-R., Schunter, M., Stüble, C.: Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18(1), 80–121 (2010)

    Google Scholar 

  7. Berger, S., Caceres, R., Pendarakis, D.E., Sailer, R., Valdez, E., Perez, R., Schildhauer, W., Srinivasan, D.: Managing security in the trusted virtual datacenter. Oper. Syst. Rev. 42(1), 40–47 (2008)

    Article  Google Scholar 

  8. Catuogno, L., Dmitrienko, A., Eriksson, K., Kuhlmann, D., Sadeghi, A.-R., Schulz, S., Schunter, M., Winandy, M., Zhan, J.: Trusted virtual domains—design, implementation and lessons learned. In: International Conference on Trusted Systems. Spring (2009)

    Google Scholar 

  9. Adeyinka, O.: Internet attack methods and internet security technology. In: Second Asia international conference on modeling and simulation, 2008, AICMS 08, pp. 13–82 (2008)

    Google Scholar 

  10. Kartalopoulos, S.V.: Differentiating data security and network security. IEEE international conference on communications, 2008, ICC’08, pp. 1469–1473 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Liao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Liao, Y., Li, XT. (2013). The Implementation with the Network Data Security on the Secure Desktop. In: Wong, W.E., Ma, T. (eds) Emerging Technologies for Information Systems, Computing, and Management. Lecture Notes in Electrical Engineering, vol 236. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7010-6_90

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7010-6_90

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7009-0

  • Online ISBN: 978-1-4614-7010-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics