Font Size: a A A

Document Security System Research And Design In E-government

Posted on:2011-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y M YangFull Text:PDF
GTID:2198330332494796Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularization of information technology in China and the political system of in-depth, various types of information technology tools have been applied in the government, greatly improve the government's efficiency, on the pattern of changes in administrative office have a profound impact. Therefore, the reform of the traditional office model, launched e-government, is an inevitable trend. This can allow the Government to staff the office from the complex to liberate them, improve efficiency, reduce administrative costs.This thesis focus on how to design a secure, efficient document system. In the existing document systems,No one through the life cycle perspective to consider the design of safety documents system, but only consider a part of official documents, such as handling, transport and so on. Depends on the existing system of official documents, it use life cycle thinking on the comprehensive consideration of the entire system. To some extent, the security subsystem is also a separate system. On this basis, the paper introduces a new perspective, a new design method.Firstly, in time and space dimension to findout the system requirements. Accurate, effective demand is the basis of an efficient system. From the dimension of time, according to documents dealing with the life cycle of a detailed analysis of the document system security requirements. A document from the drafting, transmission, processing, Destruction form a complete cycle. The negligence of any one link, it will threaten the whole system. From the dimension of space, from the document system can pose a security threat factors, the analysis to document system requirements. Contact with the documents cannot only---the human element of the drafting of documents, users, readers, etc., but also the factors that matter---storage equipment, transmission equipment and other needs.Secondly, in the view of system engineering, top-down design patterns, according to existing needs, determine the reasonable security architecture. From the application logic, the security module system is divided into three levels:storage security, transmission security, application security. From a security tecnnology. security module is divided into basic services, middleware, application modules. In order to ensure network security technology, integration of advanced safety technology.Thirdly, security is the core of the system. As a security product, the key to success of this system security services, according to type, and select the appropriate security mechanisms, integration of advanced security technologies to meet the actual needs of users. Especially as related to information security based on PKI technology implementations. Such as digital envelopes, authorization management, key management, and file compression package and so on.Finally, by hard coding and testing, we keep the trace of the user's technical requirements, global control of the technical requirements of the technical requirements to achieve security. The whole system online, effectively improve the efficiency of document circulation.
Keywords/Search Tags:e-government, security policy, system design
PDF Full Text Request
Related items