Asian Journal of Computer Science and Technology (AJCST)
Network Security Based on Component for Information NetworkAuthor : A. Aruljothi, N. Prabhu and N. M. Mallika
Volume 8 No.1 Special Issue:February 2019 pp 15-17
It is a difficult building to ensure the security of data arrange, so it is important to consider out a new security control design and model in the viewpoint of foundational control. As indicated by the attributes and security requests of data net, another security control viewpoint and its engineering dependent on parts is proposed, the security control framework is made-up, and insights regarding the structure of control system, its different kinds, and capacities and spread methods of security control parts are presented, at that point the highlights of the control framework are outlined at last.
Component, Info-Net, Trust Domain, Security, Security Control, Architecture
 “Dark Reading: Automating Breach Detection for the Way Security Professionals Think”, October 1, 2015.
 Stallings, and Brown, Computer Security: Principles and Practice, 3/e, Prentice Zhang Haixia, Lian Yifeng, Su Purui, and Feng Dengguo Hall, 2014.
 Stamp, Information Security: Principles and Practice, 2/e, Wiley, 2011.
 Goodrich and Tamassia, Introduction to Computer Security Addison-Wesley, 2010.
 Zhang Haixia, Lian Yifeng, Su Purui, and Feng Dengguo, “Security-state-Region-Based Model of Network Security Evaluation”, Journal of Software, Vol.20, No. 2, pp. 451-461, Feb. 2009.
 Feng Dongqing, Sun Changfeng, and Fei Minrui, “Research on a New LMS Algorithm with Variable StePlength”, Process Automation Instrumentation, Shanghai, china, Vol. 7, pp. 67-69, 2007.