| The government departments are taking on important roles in the economics development and construction .With network application developing increasingly ,some important government services have already been taken through internet. With the development of the E-government ,the working of government departments have been changed.How to improve the government's working efficiency through ensuring information security is a hot question .The technique of PKI can well solve secure problems which E-government faces .It may efficiently solve these questions including the confidentiality ,the authenticity ,the integrality ,the access control , etc. Thus the technique of PKI has been applied to E- government. PKI system is the core of the technique of information security ,including a series of hardware , software , policies and persons. After the PKI system is completely implemented , information security is assured to protest sensitive communication .In this essay, firstly , Introduce the technology of information security ,the background of studying and the meaning of choosing the topic . secondly, introducing the theories of PKI cryptographic system , and the OO technology of J2EE. Furthermore , describing precisely the overall designing ideas of this system of certification management ,and the main functions of each module . finally , analyzing the factual implement method of some module that I take charge of, such as the login module ,the cryptographic module and main functions of certification management.After analyzing and researching current information securitytechnology, we propose a systemic model of information security based on PKI,J2EE and discuss their function , structure and components , etc . Based on the model , we design and implement a secure WEB .The system has some advantages , like:Without any modification , this system can run in any OS ,such as Window ,Linux ,Unix etc .When using , user can access this system ,only resort to he browser, and easier to accomplish the job.Without the process of setup for clients, easier to use ,and the lower training cost.The maintainment and management can accomplish only carrying out in the server , feasible to update and modify. Some other work need to be studied ,as follow:In theory ,some algorithms should be implemented in the PKI.Now take the centre method to manage the CA and reducing the capability ,planning to take use of the distributed method.Wish to combine the LDAP and database to manage the certification requesting and repealing. |