[1]冀峰.基于PKI体系的电子政务应用层安全的研究[J].计算机技术与发展,2006,(10):149-152.
 JI Feng.Research on Electronic Government Affairs Application Layer Safety Based on PKI System[J].,2006,(10):149-152.
点击复制

基于PKI体系的电子政务应用层安全的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年10期
页码:
149-152
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Electronic Government Affairs Application Layer Safety Based on PKI System
文章编号:
1673-629X(2006)10-0149-04
作者:
冀峰
西安电子科技大学计算机学院
Author(s):
JI Feng
Computer School, Xidian Univ
关键词:
PKI信息安全应用层
Keywords:
PKI information securityapplication system
分类号:
TP393.08
文献标志码:
A
摘要:
电子政务对信息安全有着很高的要求,电子政务信息安全体系必是多层次的各种安全技术和安全策略相结合的产物。文中分析了安全体系应用系统层的安全,强调了构建于核心层PKI/CA之上的应用层安全应采取以CA认证为主的多种手段相结合的策略。在对现有信息安全技术分析和研究的基础上,提出了在电子政务安全体系中采取基于角色权限的访问控制(RBAC)模式,并从功能、结构和组成等方面对其进行了详细讨论。最后,提出了本领域有待于进一步研究的问题
Abstract:
The information security of the E-government system is demanded highly. It must be the integration product of applying types of different security technologies and security policies. Muhianalyses level security of security system application system. Emphasize the PKI construction for the application layer security, which is based on the CA certification system with other accessorial security technologies. In to existing information security technology analysis and in research foundation, proposed adopting the electronic government affairs security system based on role jurisdiction access control (RBAC). And from aspects such as function, structure and composition has carried on the detailed discussion to it. Finally, point out some problems that shall make some further research

相似文献/References:

[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
 HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(10):185.
[2]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
 ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(10):160.
[3]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
 REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(10):151.
[4]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
 MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(10):159.
[5]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
 ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(10):144.
[6]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
 YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(10):177.
[7]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
 LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(10):173.
[8]罗佳 杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,(10):177.
 LUO Jia,YANG Shi-ping.Fuzzy Risk Assessment for Information Security Based on Method of Entropy - Weight Coefficient[J].,2009,(10):177.
[9]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(10):165.
[10]邓晓军.PKI技术及其应用的分析[J].计算机技术与发展,2008,(06):144.
 DENG Xiao-jun.Analysis of PKI Technology and Its Application[J].,2008,(10):144.

备注/Memo

备注/Memo:
冀峰(1973-),男,陕西西安人,硕士研究生,研究方向为电子政务,导师
更新日期/Last Update: 1900-01-01