期刊文献+

电子政务资源安全管理的研究与应用

Research and Application of E-Government Resource Security Management
下载PDF
导出
摘要 随着计算机和网络技术的发展,电子政务已经成为时代的必然,电子政务安全也随之成为人们关注的焦点。电子政务安全应该从物理层、网络层、系统层、应用层上总体考虑。文中从应用系统角度出发对电子政务资源安全管理进行了研究和探讨,主要分析、研究了身份认证和访问控制这两层安全服务,并给出了相应的基于J2EE的系统平台设计方案。该方案应用到了某工业局电子政务系统当中,达到了用户的安全需求,整个系统实现了较为灵活的安全配置和控制。 With the development of computer and network technology, E - government becomes necessiW of the epoch, and its securiw is becoming focus of people. The E - government security should be researched from 4 6es, the physical, network, system and application. The paper studies the E - government resource security management from the applied system, mainly about the user authentication and access control. It gives the corresponding solution projeet based - on J2EE. The solution had been applied in an E - government system of an industrial bureau, it meets to the user's requirement, and implements the flexible secure configuration and control.
出处 《计算机技术与发展》 2006年第9期222-223,226,共3页 Computer Technology and Development
关键词 电子政务 安全 身份认证 访问控制 E - government security user authentication a ccess control
  • 相关文献

参考文献5

二级参考文献21

  • 1[1]ISO IS 7498-2. Information Processing Systems--Open Systems Intereonnection Basic Reference Model-Part 2:Security Architecture.ISO Geneva, Switzerland, 1989
  • 2[2]A Report for the Public Sector CIO Council. Information Security:Raising Awareness. Subcommittee on Information Protection,2000-04
  • 3[3]Department of Defense.Trusted Computer System Evaluation Criteria.Standard 5200.28-STD, 1985-12
  • 4[4]Davila J, Lopez J, Mana A. Development of Secure Internet Applications for Governmental Environments. Proceedings of the 11th International Workshop on Database and Expert Systems App1ications (DEXA'00),2000
  • 5[5]Joshi J, Ghafoor A, Aref W G. Digital Government Security Infrastructure Design Challenges. Comlputer.,2001-02
  • 6[6]Wimmer M, Von Bredow B. E-government: Aspects of Security on Different Layers. Konferenzbeiuag, Dexa'2001, Munchen,2001-09
  • 7[7]Jiang Tao, Liu Jiren, Qin Yang The Research on Dynamic Selfadalptive Network Security Model Based on Mobile Agent. Proceedings of the 36th International Conference on Technology of Object-oriented Languages and Systems (TOOLS-Asia'00),2000
  • 8Ferrraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Refernence Implementation Within a Corporate Intranet [J].ACM Transactions on Information Systems Security, 1999-02.
  • 9http ://www-9OO.ibm.com/developerWorks/cn/security/syscontrol/index.shtml.
  • 10焦李成,神经网络系统理论,1992年

共引文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部