Font Size: a A A

Research And Application Of Digital Signature In Electricity Dispatch Management Information System

Posted on:2009-09-09Degree:MasterType:Thesis
Country:ChinaCandidate:J Q JiangFull Text:PDF
GTID:2178360245462872Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
We have entered into the information society now, it has brought us great convenience through the using of the network. Now companies are trying to build their own management information systems. However ,for any information system, the robust and effective security management mechanism is fundamental guarantee to legally use information. Therefore, security of information system has become an important research field.Management information system is vulnerable to be attacked through network, resulting in the leakage of information, or withheld, tampered with, etc. There are a lot of technologies to guarantee the security of information management, but it still needs greater effort to guarantee the security of information absolutely. Against the needs of DMIS system for the security, this paper proposed a security mechanism based on the security of digital signature.It presents a system framework for DMIS with digital signatures, encryption, access control and other security technology, and resolves secure problems from five parts below. First, a Message-Digest algorithm SHA-1 is implemented to encipher and transmit user login password with random strengthened number, which completes authentication mechanism under cryptic environment. Second, SSL standard is adopted to transport data securely on the Internet without security guarantee. Third, a security information database which takes RBAC mechanism is constructed to help users access database legally. Fourth, a new symmetrical encrypt algorithm-AES is applied on database to prevent illegal users to read the important data. Finally, it proposed a complete digital signature scheme, it brings the integrity, the undeniable message, the exchange of information and the identity of the uncertainties of the information votes.
Keywords/Search Tags:Digital signature, Public-key cryptosystem, Management information system, Encryption, Authentication
PDF Full Text Request
Related items