This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
SIISAM: A Model for Secure Inhomogeneous Information Systems
July 2008 (vol. 41 no. 7)
pp. 56-61
Kun Wang, Xidian University
Zhonghai Yin, Xidian University
Lihua Zhou, Xidian University
Feng Yuan, National Information Security Engineering and Technology Research Center, Beijing
Zengxin Li, National Information Security Engineering and Technology Research Center, Beijing
SIISAM is a multilayered, Web-service-based architecture model designed to guide construction of a secure, interoperable, and extensible information system that allows smooth interoperation of legacy applications. A pilot e-government system in China built using the model has achieved its targets in both functionality and performance.

1. Guide for XML Application in E-government, China Nat'l Standard GB/Z 19669–2005, 2005.
2. M.R. Grimaila, "Maximizing Business Information Security's Educational Value," IEEE Security &Privacy, Jan./Feb. 2004, pp. 56–60.
3. Safety of Information Technology Equipment, China Nat'l Standard GB 4943–2001, 2001.
4. Security Requirements for Router, China Nat'l Standard GB/T 18018–1999, 1999.
5. Information Technology-Security Requirements for Packet Filter Firewalls, China Nat'l Standard, GB/T 18019–1999, 1999.
6. Information Technology-Security Requirements for Application Level Firewall, China Nat'l Standard, GB/T 18020–1999, 1999.
7. L.H. Zhu, J. Shi, and C.X. Shen, "Physical Isolation Problems in Secure Network," Electronic Computers, Feb. 2002, pp. 16–19.
8. K. Wang et al., "Robust Disaster Recovery System Model," Wuhan Univ. J. Natural Sciences, Jan. 2006, pp. 170–174.
9. Q. Liu, "Trend of Chinese E-government," China Information Rev., no. 12, 2004, pp. 21–23.
1. H.P. In et al., "A Security Risk Analysis Model for Information Systems," Proc. 3rd Asian Simulation Conf., LNCS 3398, Springer, 2005, pp. 505–513.
2. V.C.S. Lee, "A Fuzzy Multi-Criteria Decision Model for Information System Security Investment," Proc. 4th Int'l Conf. Intelligent Data Engineering and Automated Learning, LNCS 2690, Springer, 2003, pp. 436–441.
3. A. Shnitko, "Adaptive Security in Complex Information Systems," Proc. 7th Korea-Russia Int'l Symp. Science and Technology, vol. 2, IEEE Press, 2003, pp. 206–210.
4. S.P. Li and H.B. Sun, "Research on Information System Security Models," ACTA Electronica Sinica, Oct. 2003, pp. 1491–1495.
5. B. Zhou, "Security Analysis and the DSM Model," Proc. 13th Int'l Workshop Database and Expert Systems Applications, IEEE CS Press, 2002, pp. 17–21.
6. G. Hripcsak, "IAIMS Architecture," J. Am. Medical Informatics Assoc., Mar./Apr. 1997, pp. S20–S30.
7. S-Y. Lee and J-S. Koh, "WWW-Based Reliability Information System," Computers and Industrial Eng., Dec. 1998, pp. 599–602.
8. S-C.T. Chou, "Migrating to the Web: A Web Financial Information System Server," Decision Support Systems, May 1998, pp. 29–40.
9. R. Van de Velde, "Framework for a Clinical Information System," Int'l J. Medical Informatics, Jan. 2000, pp. 57–72.

Index Terms:
information systems, security, architecture models, interoperability
Citation:
Kun Wang, Zhonghai Yin, Lihua Zhou, Feng Yuan, Zengxin Li, "SIISAM: A Model for Secure Inhomogeneous Information Systems," Computer, vol. 41, no. 7, pp. 56-61, July 2008, doi:10.1109/MC.2008.236
Usage of this product signifies your acceptance of the Terms of Use.