期刊文献+

电子政务信息安全和管理 被引量:7

Security System of the E-government Information Safety and Administration
下载PDF
导出
摘要 对于电子政务系统而言,信息安全是一个需要格外关注的问题。在享受网络带给我们的便利的同时,严格控制对信息的访问权限、保证信息的完整性对于政府来说是迫切需要解决的问题。如何构建网络时代电子政务信息的安全体系,作了一些探讨并提出了保证电子政务信息安全的措施。 To the E - government system, the information security is a problem to which we must pay close attention. Controlling strictly limits of authority of visit and assuring the integrality of the information is a imperative problem for the government by enjoying the advantage of the network. How to build the security system of the E - government information of the Network ages. This article makes some discussion, and raises some measures to assure the E- government information security.
作者 孙雷
出处 《应用能源技术》 2009年第10期42-44,共3页 Applied Energy Technology
关键词 电子政务 信息 安全 E - government Information security
  • 相关文献

参考文献3

二级参考文献23

  • 1徐志彪.政府信息化建设探索(上)[J].信息化建设,2001(7):25-31. 被引量:25
  • 2李广乾.我国电子政务的现状与问题[EB/OL].http://www.drc.gov.cn,2001-10-31.
  • 3W E Burr.Public Key Infrastructure(PKI) Technical Specifications,Part A:Technical Concept of Operations[EB/OL].http://csrc.nist.gov/pki/twg/baseline/pkicon20b.pdf,1998-09.
  • 4Varadharajan C Crall,J Pato.Issues in the Design of Secure Authorization Service for Distributed Applications[C].IEEE GLOBECOM,1998.874-879.
  • 5Lyer R K,Sarkis J.Disaster Recovery Planning in an Automated Manufacturing Environment[J].IEEE Transactions on Engineering Management,1998,45(2).
  • 6Frabutt Alan.Implementing Your Disaster Recovery Plan[J].Storage Management Solutions,1999,4(2).
  • 7Lars Frank.Evaluation of the Basic Remote Backup and Replication Methods for High Availability Database[J].Software:Practice and Experience,1999,29(15).
  • 8Hugo Patterson,Stephen Manley,Mike Federwisch,et al.SnapMirror:File-System-based Asynchronous Mirroring for Disaster Recovery[C].Monterey:The 1st USENIX Conference on File and Storage Technologies,2002.
  • 9Mukherjee B,Heberlein L T,Levitt K N.Network Intrusion Detection[J].IEEE Network,1994.
  • 10K Iglun,R A Kemmerer,P A Porras.State Transition Analysis:A Rule-based Intrusion Detection System[J].IEEE Transactions on Software Engineering,1995,21(3).

共引文献42

同被引文献22

引证文献7

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部