Font Size: a A A

Office Automatization's Security Control Strategy On The Basis Of Lotus Notes

Posted on:2003-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z LiFull Text:PDF
GTID:2168360092966501Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
People more and more think highly of office automation system. Officeauomation aPplies widely more and more. Therefore, the study of officeauomation system's security is more and more imPOrtant.This paPer describes the situation of office automation technology, anddiscusses the LotUs Notes/Domino office automation desk and itS securitycharateristic, and studies the trMsformaion technology of the electrOnicdocumeITts in the office atomation syStem and the security straegy in the courseof transforming in detal. On the base of sufficient study, we have developed onthe basis of lotUS notes/domino desk.This paPer describes the designed and realized Daqing PetroleumAdminiStraive Bureau Oil Field ConStruCtion Company Office AutomationSystem's archetyPe and security measures of it in detail for information securityand system security It has the different degree security mechwhsms from thegrades of net, server, dataase, table shee and visual chart to grades of archiveand local net The combination of the above secwtty controls can form an entirsuit of security control thegyWe have realized the control of documens delivering and receiving,electronic sea1s and documellt's conunot safely in this system. By loading thehiW reader restriction in the archive, we can control conveniently the archivereader grouP, In addition, we can realize the fOllowing operations: forbidding thescreen copy operaion and restricting the number of the printing copies whe thedocuments are accessed. We have designed the different rights and roles for thedifferen users so as to forbid the revising freely of audition opforons in the courseof the document audition. kll these studies and realhaion of security measurescan gUarane the security and reliable of the system.
Keywords/Search Tags:Office Automation, Information Security, System Security, Security Control Strategy
PDF Full Text Request
Related items