上海交通大学学报(自然版) ›› 2018, Vol. 52 ›› Issue (10): 1370-1381.doi: 10.16183/j.cnki.jsjtu.2018.10.028
李建华
作者简介:
李建华(1965-),男,江西省九江市人,教授,博士生导师,现主要从事网络空间安全理论与技术研究.
电话(Tel.):021-34205025;E-mail:lijh888@sjtu.edu.cn.
基金资助:
LI Jianhua
摘要: 在“互联网+”的背景下,电子政务对提高国家公共事务管理水平,促进社会事务管理的信息化、智能化、透明化具有重要意义.当前,随着云计算、大数据和第5代移动通信技术(5G)等新兴技术的飞速发展,新型电子政务系统的功能架构、系统实施和运行维护均得到了变革性的发展,从而有效推动了计算与通信资源的优化调度、海量政务信息的高效处理以及政务大数据的共享与应用.为了应对新兴的信息技术带来的不可忽视的安全威胁,分析了国内外电子政务系统与技术的发展趋势,深入探讨了新型电子政务的特点与技术手段,并进一步讨论了新型电子政务系统的安全防御技术.
中图分类号:
李建华. 新型电子政务及其安全保障技术[J]. 上海交通大学学报(自然版), 2018, 52(10): 1370-1381.
LI Jianhua. A Survey of New E-Government and Its Security Technologies[J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381.
[1]熊涛. 政务云对电子政务的支撑研究[J]. 电子商务, 2018, 5: 31-32. XIONG Tao. Study on the government cloud support for e-government [J]. E-Business Journal, 2018, 5: 31-32. [2]梁紫怡. “互联网+”时代电子政务发展趋势初探[J]. 中小企业管理与科技(中旬刊), 2018, 4: 110-111. LIANG Ziyi. A preliminary study on the development trend of e-government in the “Internet+” era[J]. Management and Technology of SME (Mid Magazine), 2018, 4: 110-111. [3]新华网舆情监测分析中心. 全国政务新媒体综合影响力报告[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm. Xinhuanet Public Opinion Monitoring and Analysis Center. National government new media comprehensive impact report[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm. [4]梅宏. 推进“一网、一门、一次”改革 深化“互联网+政务服务”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm. MEI Hong. Promote “one network, one, once” reform deepen the “Internet + government services”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm. [5]白银元, 刘琼芳, 胡新丽. 中美电子政务发展比较分析[J]. 现代商贸工业, 2013, 25(2): 66-69. BAI Yinyuan, LIU Qiongfang, HU Xinli. A comparative analysis of the development of e-government between China and the United States[J]. Modern Business Trade Industry, 2013, 25(2): 66-69. [6]TINHOLT D, VAN DER LINDEN N, GROENEVELD A, et al. eGovernment benchmark 2017[EB/OL]. (2017-11-17)[2018-06-30]. https: //www.capgemini.com/wp-content/uploads/2017/11/2017-egovernment-benchmark_background_v7.pdf. [7]European Commission. European eGovernment Action Plan 2016-2020[R]. Brussels: European Commission, 2016. [8]European Union Agency for Network and Information Security(ENISA). Security framework for governmental clouds[R]. Brussels: European Commission, 2015. [9]吴曼青. 新时代政务信息系统建设的目标、思路与重点[EB/OL]. [2018-07-04].http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml. WU Manqing. Objectives, ideas and priorities for the construction of a new era of government affairs information system[EB/OL]. [2018-07-04]. http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml. [10]殷利梅. 新加坡电子政务总体规划(2011—2015)及启示[J]. 信息化建设, 2011, 11: 38-41. YIN Limei. Singapore’s e-government master plan (2011-2015) and its enlightenment[J]. Information Construction, 2011, 11: 38-41. [11]吴昊, 孙宝文. 当前我国电子政务发展现状、问题及对策实证研究[J]. 国家行政学院学报, 2009, 5: 123-127. WU Hao, SUN Baowen. Current status, problems and countermeasures of e-government development in China[J]. Journal of National School of Administration, 2009, 5: 123-127. [12]国家信息安全工程技术研究中心. 电子政务总体设计与技术实现[M]. 北京: 电子工业出版社, 2003. National Information Security Engineering Technology Research Center. Overall design and technology implementation of e-government [M]. Beijing: Publishing House of Electronics Industry, 2003. [13]张成福, 唐钧. 电子政务绩效评估: 模式研究与中国战略[J]. 探索, 2004, 2: 36-40. ZHANG Chengfu, TANG Jun. E-government performance evaluation: Model research and China strategy[J]. Exploration, 2004, 2: 36-40. [14]HAYES B. Cloud computing[J]. Communications of the ACM, 2008, 51(7): 9-11. [15]JACOBSON D H. A view on cloud computing[J]. International Journal of Computers & Technology, 2010, 4(2): 50-58. [16]BUYYA R, YEO C S, VENUGOPAL S, et al. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems, 2009, 25(6): 599-616. [17]罗军舟, 金嘉晖, 宋爱波, 等. 云计算: 体系架构与关键技术[J]. 通信学报, 2011, 32(7): 3-21. LUO Junzhou, JIN Jiahui, SONG Aibo, et al. Cloud computing: Architecture and key technologies[J]. Transactions of Communications, 2011, 32(7): 3-21. [18]SUBASHINI S, KAVITHA V. A survey on security issues in service delivery models of cloud computing[J]. Journal of Network & Computer Applications, 2011, 34(1): 1-11. [19]BELOGLAZOV A, ABAWAJY J, BUYYA R. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing[J]. Future Generation Computer Systems, 2012, 28(5): 755-768. [20]温锐松, 石友康. 基于云计算的电子政务公共平台顶层设计的研究与探索[J]. 电信网技术, 2014, 2: 26-34. WEN Ruisong, SHI Youkang. Research and exploration of top-level design of electronic government common platform based on cloud computing[J]. Telecommunications Network Technology, 2014, 2: 26-34. [21]BONOMI F, MILITO R, ZHU J, et al. Fog computing and its role in the internet of things[C]//Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. Helsinki, Finland: ACM, 2012: 13-16. [22]STOJMENOVIC I, WEN S. The fog computing paradigm: Scenarios and security issues[C]//2014 Federated Conference on Computer Science and Information Systems. Warsaw, Poland: IEEE, 2014: 1-8. [23]殷康. 从云计算到雾计算[J]. 高科技与产业化, 2014, 10(7): 76-79. YIN Kang. From cloud computing to fog calculation[J]. High Tech and Industrialization, 2014, 10(7): 76-79. [24]YI S, LI C, LI Q. A survey of fog computing: Concepts, applications and issues[C]//The Workshop on Mobile Big Data. Hangzhou: ACM, 2015: 37-42. [25]HE S, DONG M, OTA K, et al. Software-defined efficient service reconstruction in fog using content awareness and weighted graph[C]//2017 IEEE Global Communications Conference. Singapore: IEEE, 2017: 1-6. [26]SHI W, CAO J, ZHANG Q, et al. Edge computing: Vision and challenges[J]. IEEE Internet of Things Journal, 2016, 3(5): 637-646. [27]WOOD T, RAMAKRISHNAN K K, HWANG J, et al. Toward a software-based network: Integrating software defined networking and network function virtualization [J]. IEEE Network, 2015, 29(3): 36-41. [28]BOCCARDI F, HEATH R W, LOZANO A, et al. Five disruptive technology directions for 5G[J]. IEEE Communications Magazine, 2014, 52(2): 74-80. [29]OSSEIRAN A, BOCCARDI F, BRAUN V, et al. Scenarios for 5G mobile and wireless communications: The vision of the METIS project[J]. Communications Magazine IEEE, 2014, 52(5): 26-35. [30]WANG C X, HAIDER F, GAO X, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. Journal of Chongqing University of Posts & Telecommunications, 2014, 52(2): 122-130. [31]李福昌. 5G技术在4G网络中应用的前景探讨[J]. 通信世界, 2017, 13: 50-52. LI Fuchang. Discussion on the application of 5G technology in 4G network[J]. Communications, 2017, 13: 50-52. [32]欧阳秋梅, 吴超. 大数据与传统安全统计数据的比较及其应用展望[J]. 中国安全科学学报, 2016, 26(3): 1-7. OUYANG Qiumei, WU Chao. Comparison of big data and traditional security statistics and its application prospects[J]. China Safety Science Journal, 2016, 26(3): 1-7. [33]林龙成, 陈波, 郭向民. 传统网络安全防御面临的新威胁: APT攻击[J]. 信息安全与技术, 2013, 4(3): 20-25. LIN Longcheng, CHEN Bo, GUO Xiangmin. A new threat to traditional network security defense: APT attack[J]. Information Security & Technology, 2013, 4(3): 20-25. [34]栾庆林, 卢辉斌. 自适应遗传算法优化神经网络的入侵检测研究[J]. 计算机工程与设计, 2008, 29(12): 3022-3025. LUAN Qinglin, LU Huibin. Research of intrusion detection based on neural network optimized by adaptive genetic algorithm[J]. Computer Engineering and Design, 2008, 29(12): 3022-3025. [35]DATTA A, FRANKLIN J, GARG D, et al. A logic of secure systems and its application to trusted computing[C]//30th IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2009: 221-236. [36]郭瑞. 深度动态防御应对APT攻击[J]. 信息安全与技术, 2014, 9: 67-69. GUO Rui. Deep dynamic defense against APT attacks[J]. Information Security and Technology, 2014, 9: 67-69. [37]ROMEIS C, JAEGER J. Dynamic protection security assessment, a technique for blackout prevention[C]//2013 IEEE Grenoble Conference. Grenoble, France: IEEE, 2013: 1-6. [38]席荣荣, 云晓春, 金舒原, 等. 网络安全态势感知研究综述[J]. 计算机应用, 2012, 32(1): 1-4. XI Rongrong, YUN Xiaochun, JIN Shuyuan, et al. Review of network security situational awareness research[J]. Journal of Computer Applications, 2012, 32(1): 1-4. [39]贾焰, 王晓伟, 韩伟红, 等. YHSSAS: 面向大规模网络的安全态势感知系统[J]. 计算机科学, 2011, 38(2): 4-8. JIA Yan, WANG Xiaowei, HAN Weihong, et al. YHSSAS: Security situation awareness system for large-scale networks[J]. Computer Science, 2011, 38(2): 4-8. [40]张勇, 谭小彬, 崔孝林, 等. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011, 22(3): 495-508. ZHANG Yong, TAN Xiaobin, CUI Xiaolin, et al. Network security situational awareness method based on Markov game model[J]. Journal of Software, 2011, 22(3): 495-508. |
[1] | 黄宇昊, 韩超, 赵明辉, 杜乾坤, 王石刚. 考虑安全飞行通道约束的无人机飞行轨迹多目标优化策略[J]. 上海交通大学学报, 2022, 56(8): 1024-1033. |
[2] | 张亮, 屈刚, 李慧星, 金皓纯. 智能电网电力监控系统网络安全态势感知平台关键技术研究及应用[J]. 上海交通大学学报, 2021, 55(S2): 103-109. |
[3] | 周毅, 秦康平, 孙近文, 范栋琦, 郑义明. 台风气象环境电网设备风险量化预警及其N-m故障处置预案在线生成方法[J]. 上海交通大学学报, 2021, 55(S2): 22-30. |
[4] | 吴楠, 程哲韬, 杜亮, 沈颖平. 基于Dempster-Shafer证据理论的网络安全推断方法[J]. 上海交通大学学报, 2021, 55(S2): 77-81. |
[5] | 杨辰, 颜国正, 周泽润, 华芳芳. 人造肛门括约肌经皮无线供能系统安全性及相容性分析[J]. 上海交通大学学报, 2021, 55(9): 1151-1157. |
[6] | 陈瑛, 卫国宁, 唐生勇, 康志宇. 国际太空安全形势分析与发展建议[J]. 空天防御, 2021, 4(3): 99-104. |
[7] | 梅蓉. 森林环境下的无人直升机安全飞行控制[J]. 上海交通大学学报, 2020, 54(9): 994-999. |
[8] | 杨广宇, 仇洪冰. 保密多输入多输出无线携能系统的节能稳健优化[J]. 上海交通大学学报, 2020, 54(4): 369-375. |
[9] | 孙卓,刘东,肖安洪,明平洲,郭文,周俊燚,陈俊杰. 基于攻击树模型的数字化控制系统信息安全分析[J]. 上海交通大学学报, 2019, 53(Sup.1): 68-73. |
[10] | 马玥,刘清,王庭兵. 核安全级电子产品印制线路板组装件高效清洗技术[J]. 上海交通大学学报, 2019, 53(Sup.1): 78-83. |
[11] | 吴礼银,许标,张庆,文宾双. 降额设计在核电厂安全级DCS可靠性分析中的研究[J]. 上海交通大学学报, 2019, 53(Sup.1): 98-103. |
[12] | 郭娟娟, 杜哲, 杜江鹏, 王皓, 邵志江. 一种舰载武器系统的防雷能力分析[J]. 空天防御, 2019, 2(3): 19-24. |
[13] | 李长华, 程兆欣, 刘洋. 管线金属网人身防护施工方法[J]. 海洋工程装备与技术, 2018, 5(增刊): 271-275. |
[14] | 马超, 俞博瀚, 郭嘉宁, 崔洪然. 通道式多功能管箱的设计和应用[J]. 海洋工程装备与技术, 2018, 5(6): 396-399. |
[15] | 杜现斌,赵又群,肖振,林棻. 基于刷子模型的悬链式非充气车轮外倾侧偏特性分析[J]. 上海交通大学学报(自然版), 2018, 52(3): 305-311. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||