Font Size: a A A

Comprehensive Information Management System Security Policy And Its Application

Posted on:2005-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:L XueFull Text:PDF
GTID:2208360122497262Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
With the popularity use of the computer technology and rapid development of the enterprise information system, more and more enterprises have their own Information System. The integrated statistics information system has the large amount of data to be operated which is stored in the database platform of the system. The information that is very important to the enterprise also exists in the data. During the development of multiple-users information system, the control and realization of the security is the important part of the integrated statistics information system for the reason that the large amount of the important information is stored centralized and shared by multiple users.This article has researched the security policy of the Information System based on the development of the integrated statistics information system for Shenyang Power Supply Company. The system is of multiple users. It is the information source, which fully provides the information of the power supply of the enterprise and power usage of the users. How to keep the data from the steal and crack of the illegal users is very important to the robust of the MIS. It is also a question that it is to be considered when developing the Information System. This article changed the old client/server system and used the component technology of the three layers. In this structure, the logic layer exists hi the application server. By doing this, the security of this system has been improved. On the base of the traditional database security technology and the actual business condition, the security of the system has been guaranteed by using the technology of the store procedure and trigger of the Sybase, Windows API, data window object of the PowerBuilder, TreeView control and data pipeline. And by using the technology mentioned above, the system also has the realization of the id reorganization, access control, encrypt, backup recover and logging. According to the large number of the tables of the actual business, this article also provides a new scheme of the management of the table reporting and maintenance of the authorization combined with the direct access control and role based access control. This scheme has the very good popularity and is suitable for the complex integrated statistics information system having multiple users and a lot of tables. The design of the system also considered the extension. The design of the database and program made the extension of the system very easy. Now, the design written in the article has been used in the integrated statistics information system for Shenyang Power Supply Company successfully.
Keywords/Search Tags:Information security, Access control, Database, Encrypt, Backup recover, Log
PDF Full Text Request
Related items