Font Size: a A A

The Design And Implement Technology Of Electronic Government Information Security System

Posted on:2004-09-08Degree:MasterType:Thesis
Country:ChinaCandidate:X TanFull Text:PDF
GTID:2168360092993497Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Government implementing electronics later on, the electronic government will involve to every kind of system, every kind of application and the usage of every kind of level of personnel structure, will face the enormous security threats necessarily. Therefore, the security problem of the electronic government becomes an important problem, which concerns comprehensive .implementation of the electronic government.This article, aiming at security threats of the electronic government and requirements of security functions, makes use of the current mature and security technology and product to reasonably deploy every kind of safe service, provides a frame solution for the electronic government information security. Meanwhile, based on the researches carried out by JBEGP ( Jade Bird Electronic Government Platform) ,it designs for authentication and access control two parts of the electronic government information security system from the total frame and the model . resolves some realization in a specific way from the technical problems.In the authentication design part, this article analyzes the faults of authentication system originally possessed, putting forward functions and requests of the authentication part in the information security system (One is to provide the whole net customers with united strong authentication. Two is of the good compatibility with original authentication of the system and to design the homologous solution for this. (One is to establish PKI/ CA attestation center. Two is to provide united attestation service).In the access control design part, this thesis does as follows work:1. compares and analyzes the DAC. MAC, NIST-RBAC access control model; 2. analyzes the access control needs of the applied electronic government system; 3. uses the language of UML to proceed the detailed design to the system of RBAC; 4, uses the language of XML to describe access control information to the model of RBAC and illustrates alternant techniques of XML realization in the distributed type of network environment; 5. adopts the J2EE techniques and makes use of the safe services provided by application server to implement the system of RBAC.In the last part of the article, it puts forward the future direction for research.
Keywords/Search Tags:Electronic government, VPN, authentication, access control, PKI/CA, RBAC, UML, XML etc
PDF Full Text Request
Related items