Font Size: a A A

The Research On Security Of The Call System In Government Intranet

Posted on:2008-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:P LiuFull Text:PDF
GTID:2178360212474735Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of Government Intranet and the prevalence of application system, more and more files and information are transmitted in the Intranet. It is an urgent task to inform the receivers of receiving the files or information. Especially for the large-scale application systems, there is a lot of things for the workers to do manually,such as recording all the receivers'telephone numbers, sending messages or ringing them one by one, and sometimes some receivers may be not informed or be informed wrongly for the workers'mistakes. To resolve all these problems, the Call System is proposed to meet the needs of instant message informing on the basis of Government Intranet resources. We pay more attention to the security of the Call System.This paper adopts the method of integration theory with practice. Based on the characteristics of the Government Intranet, this dissertation proposes two security methods to resolve the security issues related to the system: one is Public Key Infrastructure, the other is Trusted Computing. Considering the reality, the Call System in Government Intranet adopts the security platform based on PKI mechanism. The Call System uses mechanism of the dual-centers and dual-certificates. It realizes bidirectional authentication with a smart USB-KEY and Pin password. By the way of encryption, message authentication, and digital signature, the Call System can defense the interior attacks and achieves fine-grained security. And also, The Call System can audit the dubious event by analyzing the log. It realizes access-control with the model of Role Based Access Control. The system meets the requirement of confidentiality, integration and Non-repudiation by the way of authentication, authorization, audit and digital signature.
Keywords/Search Tags:the Call System, Security of Government Intranet, Public Key Infrastructure, Trusted Computing
PDF Full Text Request
Related items