期刊文献+

电子文档的安全审计与保密技术研究 被引量:5

Study on E-document Security Audit and Confidentiality Technology
原文传递
导出
摘要 内网的安全,其实质就是数据的安全。因此,首先应该关注数据类型,确定保护对象,方能有的放矢。如今,使用最广泛的电子文件格式是文档文件,尤其是对于政府部门和事业单位,文档是最主要的信息载体,基本上所有的涉密文件均为文档类型。因此保护好文档安全,在一定程度上就是保护好内网安全。在内网建立一套完善的文档安全防护机制,在终端直接对文档的行为进行监控和审计,是防止文档泄露的最佳解决方案之一。对文档的监控和审计,能杜绝很大一部分泄密事件的发生,即使泄密事件发生,也能够很快找到泄密途径,追究责任,挽回损失;同时,通过对大量行为数据的分析,能够为管理者找到安全管理漏洞,不断完善安全管理机制。 Network security, essentially is the data security. So, first of all, the attention should be paid to the data type, protection object. Nowadays, the most widely used is electronic file format, particularly for government departments, public institutions. The document is the main carrier of information, all confidential documents basically belong to the document type. Thus the protection of document security, to a certain extent, is to protect the network security. The construction of perfect document security protection mechanism in the intranet, and the direct conduct of document monitoring and audit in the terminal, are the fairly good solutions for document leakage. The document monitoring and audit can largely prevent the occurrence of leakage incidents, even if the incidents happen, can quickly find the leaking ways, accountability, and remedies. Meanwhile, the analysis on large quantities of behaviors data can help managers find the security loopholes, and constantly improve the safety management mechanism.
作者 王飞
出处 《信息安全与通信保密》 2011年第3期73-74,78,共3页 Information Security and Communications Privacy
关键词 文档安全审计 文档操作行为 文档内容行为 电子文档保密技术 document security audit document operation behavior document content behavior E-document security technology
  • 相关文献

参考文献4

二级参考文献10

  • 1Tanenbaum A S 熊桂喜等(译).计算机网络(第三版)[M].北京:清华大学出版社,1995..
  • 2Peterson L Davie B S.Computer Networks,A System Approach[M].北京:机械工业出版社,1996..
  • 3Shor P W. Algorithms for quantum computation,discrete log and factoring[J]. FOCS'35, 1994: 124.
  • 4Grover L K . A fast quantum mechanical algorithm for database search[C]. Proceedings, 28th Annual ACM Symposium on the Theory of Computing, 1996: 212.
  • 5Elliott C. Building the quantum network[J]. New J. Phys. 2002, 04: 46.
  • 6Dominic Mayers. Unconditional Security in Quantum Cryptography[J]. Journal of the ACM, 2001,48(3): 351-406.
  • 7Shor P W. Preskill, Simple Proof of Security of the BB84 Quantum Key Distribution Protocol [J]. Phys. Rev. Lett., 2000, 85: 441-444.
  • 8Bosrtom K, Felbinger T. Deterministic secure direct communication using entanglement[J]. Phys. Rev. Lett., 2002, 89 (18).
  • 9陈晖,祝世雄,张文政,朱甫臣.量子通信的安全性分析[J].信息安全与通信保密,2008,30(12):120-121. 被引量:7
  • 10周春源,吴光,陈修亮,李和祥,曾和平.50km光纤中量子保密通信[J].中国科学(G辑),2003,33(6):538-543. 被引量:12

共引文献32

同被引文献40

  • 1孙伟,冯萍.一种启发式宏病毒扫描技术[J].长春大学学报,2007,17(2):59-62. 被引量:3
  • 2戈芝卉,陆云.高校电子党务信息安全分析及防范对策[J].杭州电子科技大学学报(社会科学版),2011,7(1):75-78. 被引量:3
  • 3张宏,贺也平,石志国.基于周期时间限制的自主访问控制委托模型[J].计算机学报,2006,29(8):1427-1437. 被引量:20
  • 4刘利锋,王良,蒲建宁.电子文档安全管理系统的安全保密性分析研究[C].襄樊:第17届全国信息保密学术会议,2007:147-151.
  • 5庄济功,刘文等.基于数字权限管理(DRM)技术的安全电子文档管理系统[c].第十八届全国信息保密学术会议论文集,2008年11月.
  • 6AGILENT Technologies Inc. Qos Management Solution for MPLS Virtual Private Network Managed Services[J]. IEEECommunications Magazine, 2004, 42(8) : 14-14.
  • 7Sally Floyd, Van Jacobson. Random Early Detection Gateways for Congestion Avoidance[J]. IEEE/ACM Tramon Networking, 1993(4) : 397-413.
  • 8BOURAS Christos J, STAMNS Kostas. Performance Analysis of Adaptive Admission Control Algorithm for Bandwidth Broke[J]. Journal of Network & Systems Manage, 2005, 34(3): 156-163.
  • 9Simon B, Lorrie C, Dave K, et al. Analysis of security vulnera-bilities in the movie production and distribution process[ C ]// Proc of the 3rd ACM Workshop on Digital Rights Management. Washington : [ s. n. ] ,2007 : 1-12.
  • 10Gordon L A, Loeb M P ,Lueyshyn M ,et al. CSI/FBI Computer Clime and Security Survey [EB/OL]. 2006. http ://i. cmpnet. com/gocsi/db_area/pdfs/fbi/FBI2006.pdf.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部