期刊文献+

商用密码算法在政务服务一体化系统中的应用 被引量:3

Application of Commercial Cryptographic Algorithm in Government Affairs Service Integration System
下载PDF
导出
摘要 基于商用密码应用安全性评估相关要求,对广东省卫生健康委正在建设的政务服务一体化系统密码算法应用现状和应用需求进行分析,探讨政务服务一体化系统中商用密码应用总体架构,并从物理环境安全建设、密码算法替代、身份鉴别、安全加密通道、数据存储机密性与完整性保护、密钥管理,以及安全管理体系建设等方面,阐述了政务服务一体化系统商用密码应用的具体建设内容、应用场景和工作流程,为商用密码算法在政务服务一体化系统中的应用与治理提供参考。 Based on the relevant requirements of the application security assessments of commercial cryptography algorithm,this paper analyzes the application status and application demand of the cryptography algorithm in the government affairs service integration system under construction of Health Commission of Guangdong Province. It discusses the overall architecture of the commercial cryptography algorithm in the government affairs service integration system, expounds the specific construction content,application scenario and workflow of commercial cryptography algorithm in the government service integration system from the aspects of the security construction of physical environment, substitution of cryptography algorithms,identity authentication, secure encryption channels,data storage confidentiality protection,data storage integrity protection and construction of security management system, so as to provide reference forthe application and governance of the commercial cryptography algorithm in the government affairs service integration system.
作者 李云霄 余张杰 马国炬 傅承主 LI Yunxiao;YU Zhangjie;MA Guoju;FU Chengzhu(Affairs Service Center of Health Commission of Guangdong Province,Guangzhou 510060,Guangdong,China)
出处 《中国卫生信息管理杂志》 2022年第6期818-824,共7页 Chinese Journal of Health Informatics and Management
基金 国家卫生健康委统计信息中心委托课题《2021年区域全民健康信息标准应用评价研究》(项目编号:2021[HT]117)。
关键词 商用密码算法 政务服务 数字政府 密码应用 commercial cryptographic algorithm government affairs service digital government cryptographic algorithm application
  • 相关文献

参考文献14

二级参考文献72

  • 1国家密码管理局.SM2椭圆曲线公钥密码算法[EB/OL].http://www.OSCCR.govcn/UpFile/2010122214822692.pdf,2010-12-22/2012-09-11.
  • 2Trusted Mobile Platform Protocol Specification Document.
  • 3Trusted Computing Group.Trusted Computing Group TPM specification Version 1.2. http://www.trustedcomputinggroup.org . 2003
  • 4沈昌祥,张兴,于昇,祝璐,周明,周艺华.一种可信网络接入框架[P]. 中国专利:CN101136928,
  • 5(美) 查利纳 (Challener,D.) 等,著.可信计算[M]. 机械工业出版社, 2008
  • 6Trusted Computing Group.TCG TNC IF-T: Protocol Binding for Tunneled EAPMethods specification version1.0. http://www.trustedcomputinggroup.org/ .
  • 7Trusted Computing Group.TCG TPM Specification Version 1.1. http://www.trustedcomputinggroup.org .
  • 8Trusted Computing Group.TCG TPM Specification Version 1.3. http://www.trustedcomputinggroup.org .
  • 9Trusted Computing Group.TCG TPM Specification Version 1.4. http://www.trustedcomputinggroup.org .
  • 10Trusted Computing Group.TCG TNC IF-T: Protocol Binding for Tunneled EAPMethods specification version1.0. http://www.trustedcomputinggroup.org/ .

共引文献139

同被引文献23

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部