Font Size: a A A

Research And Implementation Of General Anti-Leaking Techonology For Electronic Documents

Posted on:2012-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y X HuangFull Text:PDF
GTID:2178330332969573Subject:Information security
Abstract/Summary:PDF Full Text Request
Electronic document is information distribution, transfer and storage of main means, but because it tends to be copy, modify, and spread wait for a characteristic, may cause serious information leak problem. At present, the network firewall in network level used to cope with external threat from the security threat, but they could not prevent in-house staff of intentionally and unintentionally electronic document, leak behavior, how to guarantee the electronic document in transmission, storage in the process of safety management and prevent leak become current data security important development direction.This paper firstly analyses the current mainstream prevent leak technology research current situation, proposed the decrypted based on transparent CPSec electronic document, prevent leak system model is established, CPSec system function structure, the logic structure and network architecture, design and implementation of a transparent decrypted, authorized examining and approving, document collection protection, system audit core function modules. Then in system core business process design, developed a key distribution, take off dense examination and approval, license authorization, document outside sends such key support business. In the core component design part, this paper is to support high concurrent business server, domain structure generation algorithm, data communication encrypt such core technical problems were studied and gives the implementation scheme. Finally, this paper on the system of each index to carry on the detailed test, the test results show that the function of the system, performance, safety and simultaneity achieves expected indexes, the electronic document, prevent leak technology in real application has good application value.
Keywords/Search Tags:electronic document security management, transparent decrypted, access control, IOCP, enterprise organization structure
PDF Full Text Request
Related items