Biblio

Filters: Author is Guan, Xiaojuan  [Clear All Filters]
2022-12-02
Fang, Wengao, Guan, Xiaojuan.  2022.  Research on iOS Remote Security Access Technology Based on Zero Trust. 2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC). 6:238—241.

Under the situation of regular epidemic prevention and control, teleworking has gradually become a normal working mode. With the development of modern information technologies such as big data, cloud computing and mobile Internet, it's become a problem that how to build an effective security defense system to ensure the information security of teleworking in complex network environment while ensuring the availability, collaboration and efficiency of teleworking. One of the solutions is Zero Trust Network(ZTN), most enterprise infrastructures will operate in a hybrid zero trust/perimeter-based mode while continuing to invest in IT modernization initiatives and improve organization business processes. In this paper, we have systematically studied the zero trust principles, the logical components of zero trust architecture and the key technology of zero trust network. Based on the abstract model of zero trust architecture and information security technologies, a prototype has been realized which suitable for iOS terminals to access enterprise resources safely in teleworking mode.

2022-01-10
Guan, Xiaojuan, Ma, Yuanyuan, SHAO, Zhipeng, Cao, Wantian.  2021.  Research on Key Node Method of Network Attack Graph Based on Power Information Physical System. 2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC)2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC). :48–51.
With the increasing scale of network, the scale of attack graph has been becoming larger and larger, and the number of nodes in attack graph is also increasing, which can not directly reflect the impact of nodes on the whole system. Therefore, in this paper, a method was proposed to determine the key nodes of network attack graph of power information physical system to solve the problem of uncertain emphasis of security protection of attack graph.