期刊文献+

海关的IT运维管理的发展与展望 被引量:1

Development and Prospect of the IT Operation and Maintenance Management of the Customs
下载PDF
导出
摘要 阐述了海关信息化运维保障工作的发展线路,通过对4个阶段的运维保障工作内容的介绍,分析海关信息化运维保障体系的特色以及对信息化建设的辅助决策支持作用等,为各行业做好信息化系统运维保障工作提供参考。同时结合目前海关信息化建设情况,从业务改革影响、新技术应用、信息化服务外包、故障分析处置方式的变化以及技术设备资产智能化管理等方面对未来海关运维工作进行展望,分析海关信息化运维保障工作中面临的问题。 The development route of Customs information system operation and maintenance support was described.Through the introduction of four stages of operation and maintenance support work,the characteristics of Customs information operation and maintenance support system and the auxiliary decision-making support function for informatization construction were analyzed.It will provide reference for all industries in information system operation and maintenance work.Also,IT operation and maintenance management of the Customs was prospected from the aspects of influence of business reform,application of new technology,information service outsourcing,fault analysis and intelligent management,equipment disposal to analyze information security problems in the operation and maintenance work.
作者 姚向东 YAO Xiangdong(Tianjin Branch Center of China Electronic Port Data Center,Tianjin 300012,China)
出处 《天津科技》 2018年第5期16-18,共3页 Tianjin Science & Technology
关键词 海关 运维保障 运行监控 信息化服务 Customs operation and maintenance support operation monitoring information service
  • 相关文献

参考文献2

二级参考文献13

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2LEUSSE P, PERIORELLIS P, DIM ITRAKOST, et al. Self managed security cell, a security model for the Internet of Things and Services [C]. Proceedings of the 2009 First International Conference on Advances in Future Internet. Piscataway: IEEE, 2009: 47-52.
  • 3MULLIGAN G. The Internet of Things: here now and coming soon[J]. IEEE Intemet Computing,2010,14(1):36-37.
  • 4HAMAD F, SMALOV L, JAMES A. Energy-aw are security in commerce and the Internet of things [J]. IEEE, Technical Review, 2009, 26(5):357-362.
  • 5WATRO R, KONG D. Tiny PK: securing sensor networks with public key technology [C]. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, New York: ACM press, 2004:59-64.
  • 6BENENSON Z, GEDICKE N, RA IVIO O. Realizing robust user authentication in sensor networks [C]. Proceedings of the Work shop on Real-World Wireless Sensor Networks (REALWSN 2005). [S.l.]: Stockhohn, 2005:135-142.
  • 7MALAND J, WELSH M, SMITHM D. A public-key in frastructure for key distribution in Tiny OS based on elliptic curve cryptography [C]. 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. Piscataway, IEEE, 2004: 71-80.
  • 8International Telecommunication Union. The Internet of things[R]. ITU Report,2005.
  • 9ITU. The Internet of Things [EB/OL]. http://www.itu.int/ intemetofthings, [2010-07-03].
  • 10WEBER R H. Internet of Things-new security and privacy challenges [J]. Computer Law & Security Review, 2010, (26) : 23-30.

共引文献11

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部