Font Size: a A A

Research And Development On Information Security Key Technologies Of Supply Chain

Posted on:2006-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y L YeFull Text:PDF
GTID:2168360152489540Subject:Mechanical and electrical engineering
Abstract/Summary:PDF Full Text Request
Internet/Intranet based Supply Chain Management is now widely spread andapplied in the manufacturing field. The platform for sharing and passing informationof supply chain management mainly bases on Internet and Intranet. In present,information security problem become a "bottleneck" for node enterprises arethreatened by the problem severely. The purpose of this paper is to provide keytechnologies for information security solution of supply chain management andconstruct a model for implementing the information security of core database ofmiddle and small node enterprises in supply chain network. Firstly, the paper summarizes the development trend of the supply chain recently,by analysis information threatens the supply chain faces and information securitytechnologies either maturing or newly developed, three key technologies are carriedout to solve information security problem of Internet/Intranet based supply chainmanagement. The method and strategy to using three key technologies is put forwardby analyzing their principle and application status. Secondly, based on status of network infrastructure of middle and smallenterprises in supply chain network and the real information requirement when theyenter a supply chain network, the paper advanced a model named Supply Chain CoreDatabase Mandatory Access Control and Air Gap Protection model(SCCDB-MAC/GAP) to protection their core database in which important data arestored, combine database access control technology and using strategy of keytechnologies of supply chain information security, function of SCCDB-MAC/GAPmodel are layout. Total design and detailed design also be carried out, and keytechnologies for software prototype system development are studied. Finally, summary of the paper is given and some suggestions are made forfurther research on the topic.
Keywords/Search Tags:Supply Chain Management, Information Security, Encrption Technology, Database Security Agent, Physical Isolation
PDF Full Text Request
Related items