Font Size: a A A

The Application Of Acess Control In Document Flow System

Posted on:2006-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y HuangFull Text:PDF
GTID:2168360152471241Subject:Software engineering
Abstract/Summary:PDF Full Text Request
One kind of computer applictions is Information System. Document Flow System is a typical kind of Information system. Now, there is more thorough secure system which can privide enough plans of companies and military intelligence. Recently, Information Security, the new subject becomes the research hotspot of computer science. The measures are taken in order to protect the system from occational or malicious attacks which destroy, replace or leak the information of system. There are several secure means for protecting data. An integrated secure system at least includes indentity authentication (label and authentication), access control and secure auditing. More rigorous system additionally includes detection of attack and counterwork to attack. One important security task of information system is access control .The mechanism of access control is to define and control the access authorization for one entity to the orther .It makes sure that authorized user can access the data in system while those who are not authorized can not access the data.Currently many deparments of government have handled the offical business by information system. In such a condition, we developed Confidential Information Demonstration Protcet.The chief characteristic of the project is strengthening the research of security, which is include in the designationa of CA Certification System, Securd Email and Secure Document Flow System.Based on the study of the basic concept about Information Security and secure model and techonogy of access control, this paper discusses the mechanism of access control in information flow system. The subject under disussion is the characteristic of entity, the demand and technology of access control mechanism, which gives attention to feasible blue print of the meachanism.
Keywords/Search Tags:Information System, System Information Security, Techonogy of access control
PDF Full Text Request
Related items