期刊文献+

基于VPN的会展MIS设计

Study of Convention & Exhibition MIS Based on VPN
下载PDF
导出
摘要 会展MIS是现代会展管理必不可少的技术手段之一。运用战略目标集转化法(SST)分析会展管理的职能和任务,并转换为会展MIS的内容及实现形式。针对会展管理工作需要协同配合、信息需要安全共享的特点,将VPN技术和Internet技术应用于会展MIS中。探讨了具体实现中所涉及的SSL-VPN、整合证书系统和角色访问控制等关键技术,提出了一个基于VPN的会展MIS实例模型。 Convention & Exhibition MIS is one of the indispensiable means for modern Exhibition Management. In this paper, with the Strategy Set Transformation (SST) method, requirements and demands of exhibition management were analysed and converted to the corresponding implementations of Convention & Exhibition MIS. The technologies of Internet and VPN were applied to Convention & Exhibition MIS to meet the particular needs of mass cooperation and communication security in Exhibition Management. A model of Convention & Exhibition MIS was proposed using the VPN technique with SSL-VPN, integrated certificates systems and role- based access control.
出处 《太原理工大学学报》 CAS 北大核心 2011年第5期517-520,共4页 Journal of Taiyuan University of Technology
关键词 会展管理 管理信息系统 虚拟专用网 convention exhibition management MIS VPN
  • 相关文献

参考文献3

二级参考文献12

  • 1David Leon Clark.IT manager's guide to virtual private networks[M].Computing McGraw-Hill'1999.
  • 2Kent S'Atkinson R.Security architecture for the internet protocol[S].RFC2401'1998.
  • 3Oppliger R.Security technologies for the world wide web[M].Artech House Computer Library'2000.
  • 4Gleeson B.A framework for IP based virtual private networks[S].RFC2764'2000.
  • 5David Wagner'Bruce Sehneier.Analysis of the SSL 3.0 protocol[D].University of California'1997.
  • 6Andrew Krywaniuk.Security properties of the IPSec protocol suite[R].Internet Engineering Task Force'Internet Draft,大学出版社,2002.
  • 7Ferraiolo D F,Barkley J F,Kuhn D R.A Role Based Access Control Model and Reference Implementation Within a Corporate Intranet ACM Transactions on Information Systems Security, 1999-02
  • 8Gavrila S I, Barkley J F. Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management. Third ACM Workshop on Role-based Access Control, 1998
  • 9Sandhu R, Coyne E J,Feinstein H L,et al. Role-based Access Control Models. IEEE Computer, 1996,29(2)
  • 10聂敏.虚拟专用网及其实现途径[J].西安邮电学院学报,1999,4(4):12-15. 被引量:4

共引文献142

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部