Font Size: a A A

Research And Implement On Data High-efficiency Transfer's Security In Electronic Government System

Posted on:2006-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:J C LiFull Text:PDF
GTID:2178360212482911Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With computer and network continuously permeate, to use the technique to handling daily work of government, to enhance work efficiency, improve administration's face of government, have already become common ground in the government all over the world, hence, electronics government, the new-born business emerge with the tide of the time. In the past of years, electronics government is quickly to get broadly applied in all countries. For the few years of effort, our country's part the electronics government system of the economic and prosperous region the system and quickly make widely available many of public security official, industry and business, tax administration, commodity price…etc. This provides to people another path to affiliate with the government, and received very good results. But, at the same time, electronics government bring convenience to people, its safely also concern by people more and more, by using of pilferage legal power, illegal broken etc to invade the electronics government system have already become the hacks'main methods. The problem of security has become a key-point in the development of electronics government.How do sufficiency ensure electronics government run high-efficiency and security? This has become a importance problem of every countries, also turn into each electronics government system's development going deep into solve technique. In this paper, based on Nanjing electronics government system, research and implement a few of methods of improving electronics government's efficiency and security architecture. We make use of improved AES algorithms encrypt and decrypt the clear text, improved RSA algorithm encrypt and decrypt AES-key with CA's public key and private key. The data to be transmitted on the network are passed the SSL channels. In the end, we carry on identity authentication and visit to control with PKI/CA technology. Combine several kinds of technology above and provide a high-performance, safe data transmission system structure, and use surpass J2EE technology implement this system.This system has proved in two respects of theory and practice it is high-efficient, security in this paper.
Keywords/Search Tags:Electronic Government, AES, RSA, SSL, PKI/CA, System structure
PDF Full Text Request
Related items