Font Size: a A A

The Design Of Public Key Infrastructure Based Achieve System

Posted on:2010-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:W SongFull Text:PDF
GTID:2198330338488076Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Long period of time, following China's provincial-level party and government organs, including the city, state, city, etc. straight through a large number of government agencies expressly fax, express mail, short-wave radio channel is not encrypted and unencrypted networks such as office systems, an important means of transmission sensitive information, there are serious security risks, arising from the national security management attention. The use of cryptographic techniques for encryption of information security protection and authentication, is to protect an effective means of information security. Huangshan City in the conduct of electronic-government context of the tender, the company relies on a letter Antong resources, conducted a study on the subject, and the success of Java-based development of B / S structure of the safety of the system based on public key exchange system documents.Through a detailed analysis of demand and refining, the overall system is divided into three modules. First of all, document circulation module, mainly related to information-based office software. Followed by the PKI-based encryption system of the system were studied. In addition to the number of certified centers Anhui docking, but also to explore the system of trying to bring their own public key infrastructure to simplify the realization of the work, making the system without relying on third-party certification bodies to small-scale applications. Finally, at the same time in view of almost all development projects should be prepared to repeat "user authentication" and "competence modules" the development of object-oriented system the way through the package of components, a set of abstract universal can be the basis of transplantation RBAC rights framework.The entire system to achieve a complete transfer of the Home Affairs office documents demand for more advanced use of the current encryption algorithm model and the physical link security protection, and government agencies can greatly enhance the exchange of information security, and significantly improve the efficiency of collaboration between . Also in this issue in the realization of a simplified public key infrastructure on the exploratory development of similar applications have a certain reference value.
Keywords/Search Tags:Achieve system, PKI, Security transfer, Access Control
PDF Full Text Request
Related items