Dependent information security of star topology


Li Tianmu Computer & Software department Nanjing University of information & technology Nanjing,China Zhong Weijun School of Economic and Management Southeast University Nanjing,China


<正>Information security has externality for the infection of information system security.This paper analyzed the dependent security of information systems with star topology structure considering the important factor that the infection of information security can be controlled through intercommunication infrastructure.It argues that centralization management can bring right benefit and weak systems should be increased investment when different levels of security information system are connected.In additional,the network center should strengthen the security to reduce the losses caused by information system interaction.


Star topology;;Intercommunication;;Information security;;Externality


To explore the background and basis of the node document

Springer Journals Database

Total: 10 articles

  • [1] Howard Kunreuther;;Geoffrey Heal, Interdependent Security, Journal of Risk and Uncertainty,
  • [2] James Aspnes;;Kevin Chang;;Aleksandr Yampolskiy, Inoculation strategies for victims of viruses and the sum-of-squares partition problem, Journal of Computer and System Sciences,
  • [3] K Vineet;T Rahul;M Tridas, Enterprise Information Security:Who should manage it and how?, WEIS 2006,
  • [4] M.Lelarge;J.Bolot, Network externalities and the deployment of security features and protocols in the internet, SIGMETRICS ‘08: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems,


Similar documents

Documents that have the similar content to the node document