期刊文献+

试论基于行业级WebGIS的系统安全体系

Discussion on the Security System of Information System Based on Enterprise WebGIS
下载PDF
导出
摘要 随着W ebGIS的不断深入、发展应用,基于行业级的W ebGIS系统已深入到了政府、事业及大型企业。系统中除了大量的地理信息外,还存储着单位业务系统(OA/M IS)重要的技术和专题信息。系统内联办公自动化局域网络,外联因特网,在网络上进行着大量的重要信息交流。系统安全问题在信息系统整个生命周期过程中显得非常重要,本文论述了如何制定系统完善的安全计划和安全管理,为行业的信息安全工作提供具体的指导,提高行业信息系统的整体安全水平。 With the development and application of WebGIS, the information system based on enterprise WebGIS are applied in government and enterprise organizations. The geographic information and key technology and thematic information of organization's business system (OA/MIS) are stored in the system. The system communicates massive important information through Intranet and Internet. The security issues of the system are becoming more important in the life circle of the information system. This paper discussed how to make systematic and perfect security plan to improve the overall security level of business information system.
出处 《测绘与空间地理信息》 2006年第3期48-51,共4页 Geomatics & Spatial Information Technology
关键词 WEBGIS 信息系统 系统安全体系 WebGIS information system security system
  • 相关文献

参考文献4

  • 1[1]张世永.网络安全原理与应用[M].北京:北京科学出版社,2002.
  • 2孔雷,赵锦蓉.网络安全与代理技术[J].计算机工程与应用,2001,37(14):58-61. 被引量:9
  • 3[3]S.Kent,R.Atkinson.Security Architecture for the Internet Protocal[M].RFC 2401,1998.
  • 4[4]莫瑞·加瑟.计算机安全的技术与方法[M].吴亚菲等译.北京:电子工业出版社,1992.

二级参考文献8

  • 1[1]B Harris,R Hunt. TCP/IP Security threats and attack methods[J].Computer communications, 1999;22:885-897
  • 2[2]ITU-T Recommendation X.509.The Directory-Authentication Framework, 1997.6
  • 3[3]J Kohl ,B Neuman.The Kerberos Network Authentication Service(V5)[S].RFC1510,1993.9
  • 4[4]S Kent,R Atkinson. Security Architecture for the Internet Protocol[S].RFC2401,1998.11
  • 5[5]A Frier,P Karlton,P Kocher. The SSL 3.0 Protocol[M].Netscape Communications Corp., 1996.11
  • 6[6]B C Soh,S Yong. Network system and world wide web security[J].Computer communications, 1998;20:1431-1436
  • 7[7]Paul Wing,Brian O'Higgins. Using Public-Key Infrastructures for Security and Risk Management[J].IEEE Communications Magazine, 1999.9
  • 8[8]Ray Hunt.Intemet/Intranet firewall security-policy,architecture and transaction services[J].Computer communications, 1998;21:1107-1123

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部