期刊文献+

计算机信息存储安全保证措施研究

Study on Measures to Ensure the Security of Computer Information Storage
下载PDF
导出
摘要 从信息内容和信息连接两方面进行研究,综合两种技术的优点,提出了网络信息安全存储系统的设计模型,从存储和通信两方面保护重要信息,保证数据在传输过程中的安全.通过构筑安全通信平台,建立基于TCP的安全隧道,使用身份鉴别、访问控制、数据加密和审计日志等技术,保证通信数据的秘密性和完整性.并重点对系统的安全性进行效能评估,检验了系统对数据的控制能力.该系统为提高目前网络存储系统的安全性提供了一种可靠的解决方案. In this paper,study was conducted from the two aspects of information content and information connection,and the design model of network information security storage system was proposed based on advantages of two technologies. The security of data transmission was ensured by protecting important information from two aspects of storage and communication. Securities tunneling based on TCP was constructed by building secure communication platform,and the confidentiality and integrity of communication data were ensured by using of the technology of identification,access control,data encryption and log auditing and so on. As the focus,effectiveness evaluation was done for the security of the system and the control ability of system to data was examined. This system provides a reliable solution to improve the security of current network storage system.
出处 《西安文理学院学报(自然科学版)》 2015年第3期83-85,124,共4页 Journal of Xi’an University(Natural Science Edition)
关键词 网络信息存储安全 存储网络 数据传输 security of network information storage storage network data transmission
  • 相关文献

参考文献3

  • 1WEILER N. Honeypots for distributed denial of service attacks [ J ]. Eleventh IEEE International Workshops on Enabling Techn0109ies : Infrastructure for Collaborative Enterprises ,2002 ( 10 - 12) : 109 - 114.
  • 2SCOTI'BERG B, YURCIK W, DOSS D. Internet honeypots :protection or entrapment [ J ]. International Symposiom on Tech- nology and Society,2002(6 - 8 ) :387 - 391.
  • 3VERWOERD T, HUNT R. Intrusion detection techniques and approaches [ J ]. Computer Communications,2002,25 : 1356 - 1365.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部